Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Myung-Mook Han"'
Autor:
Gun-Yoon Shin, Younghoan Jang, Dong-Wook Kim, Sungjin Park, A-Ran Park, Younghwan Kim, Myung-Mook Han
Publikováno v:
IEEE Access, Vol 12, Pp 36361-36371 (2024)
The Dark Web is an internet domain that ensures user anonymity and has increasingly become a focal point for illegal activities and a repository for information on cyberattacks owing to the challenges in tracking its users. This study examined the cl
Externí odkaz:
https://doaj.org/article/60d307afa1304f298efbfed9af9b62ac
Autor:
Dong-Wook Kim, Gun-Yoon Shin, Young-Hoan Jang, Seungjae Cho, Kwangsoo Kim, Jaesik Kang, Myung-Mook Han
Publikováno v:
IEEE Access, Vol 12, Pp 23869-23880 (2024)
Today’s cyber-attacks have become increasingly sophisticated and diverse, targeting systems that hold sensitive information, creating the need for continuous cyber exercise and skill development for cyber professionals. Because cyber exercises requ
Externí odkaz:
https://doaj.org/article/7b428991a65242aea66ed2671f5d7058
Autor:
Mainak Basak, Myung-Mook Han
Publikováno v:
Sensors, Vol 24, Iss 11, p 3406 (2024)
Malware classification is a crucial step in defending against potential malware attacks. Despite the significance of a robust malware classifier, existing approaches reveal notable limitations in achieving high performance in malware classification.
Externí odkaz:
https://doaj.org/article/b6d06b27578b4ce0a03049ae2a61c063
Autor:
Younghoan Jang, Dong-Wook Kim, Gun-Yoon Shin, Seungjae Cho, Kwangsoo Kim, Jaesik Kang, Myung-Mook Han
Publikováno v:
IEEE Access, Vol 11, Pp 138712-138731 (2023)
With the proliferation of network systems, the boundaries between cyber and physical environments are blurring, leading to an increased risk of sophisticated cyber-attacks equipped with advanced technologies. In particular, as advancements in artific
Externí odkaz:
https://doaj.org/article/ea2eb63ef4374a8c95c210efd9a7a63e
Publikováno v:
IEEE Access, Vol 11, Pp 102381-102390 (2023)
The continuous advancement of information technology has improved user convenience but has also made it more vulnerable to cyber attacks. In particular, attackers use advanced techniques to perform new attacks. In cyber security, such attacks are def
Externí odkaz:
https://doaj.org/article/cb58f4f006c1447d92d4fe6e306273b2
Publikováno v:
IEEE Access, Vol 10, Pp 114008-114015 (2022)
Researchers have continuously sought effective ways to detect unknown (zero-day) cyberattacks in real time. Most current methods rely on pattern-recognition to identify known threats when they appear. Recently, machine learning anomaly detection tool
Externí odkaz:
https://doaj.org/article/795080a09dc743cba34652e3ac2f78fd
Publikováno v:
Applied Sciences, Vol 12, Iss 13, p 6451 (2022)
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constantly explore new ways to attack cyberinfrastructure. Recently, the use of deep learning-based intrusion detection systems has been on the rise. This ris
Externí odkaz:
https://doaj.org/article/d11145a82960455084cc517e10227a57
Publikováno v:
Computer Systems Science and Engineering. 46:153-164
Publikováno v:
Journal of Korean Institute of Intelligent Systems. 32:332-339
Publikováno v:
Journal of Korean Institute of Intelligent Systems. 31:443-449