Search

Your search keyword '"Kyungho Lee"' showing total 63 results

Search Constraints

Start Over You searched for: Author "Kyungho Lee" Remove constraint Author: "Kyungho Lee" Topic computer Remove constraint Topic: computer
63 results on '"Kyungho Lee"'

Search Results

1. Will EU’s GDPR Act as an Effective Enforcer to Gain Consent?

2. A Review of Insider Threat Detection Approaches With IoT Perspective

3. Honeypot System for Automatic Reporting of Illegal Online Gambling Sites Utilizing SMS Spam

4. Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme

5. A Multi-Component Analysis of CPTED in the Cyberspace Domain

6. Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid

7. The Gravy Value: A Set of Features for Pinpointing BOT Detection Method

8. A Statistical Approach Towards Fraud Detection in the Horse Racing

9. Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis

10. An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation

11. A Study on Selection of Block Stockyard Applying Decision Tree Learning Algorithm

12. Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator

15. A Model for Detecting Cryptocurrency Transactions with Discernible Purpose

16. Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective

17. Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness

18. Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning

19. FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device

20. Money Laundering in the Bitcoin Network: Perspective of Mixing Services

22. Motion Grammars for Character Animation

23. Strategic Decision Making Model Among Collective Intelligences Using The Game Theory in Cyber Attacks - Case study of KHNP Hacking

24. A Decision-Making Model for Handling Personal Information Using Metadata

25. Advanced Risk Measurement Approach to Insider Threats in Cyberspace

26. Advanced Mandatory Authentication Architecture Designed for Internet Bank

27. Decision Making Model for Selecting Financial Company Server Privilege Account Operations

28. Effective Risk Level Assessment Using Three-Dimensional Vector Visualization

29. Advanced protocol against MITM attacks in Industrial Control System

30. An advanced approach to security measurement system

31. Situational Awareness Framework for Cyber Crime Prevention Model in Cyber Physical System

32. Threat Analysis of Wi-Fi Connected Dashboard Camera

33. A Review of Cyber Security Controls from An ICS Perspective

34. Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident

35. Breaking Text CAPTCHA by Repeated Information

36. Cyber situational awareness enhancement with regular expressions and an evaluation methodology

37. A Study on Improvement of Effectiveness Using Anomaly Analysis rule modification in Electronic Finance Trading

39. Study on Disaster Recovery Efficiency of Terminal PC in Financial Company

40. A Study on Decision Making Process of System Access Management

41. Studies on the effect of information security investment executive

42. Generating and ranking diverse multi-character interactions

44. A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study

45. Developing Criteria for Invasion of Privacy by Personal Drone

46. Re-identification of medical records by optimum quasi-identifiers

48. A Study on Efficiency of ISMS for ICS with Compliance

49. Security control analysis of ICS

50. Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System

Catalog

Books, media, physical & digital resources