Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Shinwoo Shim"'
Autor:
Seongyun Seo, Sungmin Han, Janghyeon Park, Shinwoo Shim, Han-Eul Ryu, Byoungmo Cho, Sangkyun Lee
Publikováno v:
IEEE Access, Vol 9, Pp 129635-129647 (2021)
A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks
Externí odkaz:
https://doaj.org/article/a02c6c0f41ad43c9a004d71a158edf4d
Publikováno v:
ETRI Journal, Vol 43, Iss 2, Pp 332-343 (2020)
AbstractWith cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection technique
Externí odkaz:
https://doaj.org/article/8a4f131b4ece4d59a1de74bb7f17c9b8
Autor:
Sun-Young Im, Sang-soo Kim, Shinwoo Shim, Sung-mo Koo, Byoungmo Cho, Kwangsoo Kim, Taekyu Kim
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 47:58-65
Autor:
Taekyu Kim, ByoungMo Cho, Sung-mo Koo, Sun-young Im, Kwangsoo Kim, Sang-soo Kim, Shinwoo Shim
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 46:1862-1872
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 46:1853-1861
Autor:
Byoungmo Cho, Seongyun Seo, Shinwoo Shim, Janghyeon Park, Sungmin Han, Han-Eul Ryu, Sangkyun Lee
Publikováno v:
IEEE Access, Vol 9, Pp 129635-129647 (2021)
A network intrusion detection (NID) system plays a critical role in cybersecurity. However, the existing machine learning-based NID research has a vital issue that their experimental settings do not reflect real-world situations where unknown attacks
Publikováno v:
ETRI Journal, Vol 43, Iss 2, Pp 332-343 (2020)
With cyberattack techniques on the rise, there have been increasing developments in the detection techniques that defend against such attacks. However, cyber attackers are now developing fileless malware to bypass existing detection techniques. To co
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 45:1868-1877
Autor:
Huy Kang Kim, Younggi Park, Jione Choi, Junghee Lee, Gyuho Lee, Shinwoo Shim, Taekyu Kim, Youngjae Kim, Hwiwon Lee
Publikováno v:
IEEE Access, Vol 8, Pp 198285-198300 (2020)
It has been demonstrated that deception technologies are effective in detecting advanced persistent threats and zero-day attacks which cannot be detected by traditional signature-based intrusion detection techniques. Especially, a file-based deceptio
Publikováno v:
The Journal of Korean Institute of Communications and Information Sciences. 44:1723-1729