Digital Library[ Search Result ]
Search : "[ author: Sun-Young Im ]" (6)
A Featurization Method to Improve Anomaly Detection Performance Using Login Logs
Sun-Young Im Sang-soo Kim Shinwoo Shim Sung-mo Koo Byoungmo Cho
Kwangsoo Kim Taekyu Kim
Vol. 47, No. 1, pp. 58-65, Jan. 2022
10.7840/kics.2022.47.1.58
Kwangsoo Kim Taekyu Kim
Vol. 47, No. 1, pp. 58-65, Jan. 2022
10.7840/kics.2022.47.1.58
A Study of Detecting Lateral Movement Using Large-Scale Authentication Log
Shinwoo Shim Sang-soo Kim Sun-Young Im Sung-mo Koo Byoungmo Cho
Kwangsoo Kim Taekyu Kim
Vol. 46, No. 11, pp. 1862-1872, Nov. 2021
10.7840/kics.2021.46.11.1862
Kwangsoo Kim Taekyu Kim
Vol. 46, No. 11, pp. 1862-1872, Nov. 2021
10.7840/kics.2021.46.11.1862
A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting
Sang-soo Kim Shinwoo Shim Sun-Young Im Sung-mo Koo
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
10.7840/kics.2021.46.11.1853
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
10.7840/kics.2021.46.11.1853
Threat Analysis of the Smart Doorlock Systems Using Threat Modeling
Shinwoo Shim Sun-Young Im Han-Eul Ryu Sung-Goo Jun Taekyu Kim
Vol. 45, No. 11, pp. 1868-1877, Nov. 2020
10.7840/kics.2020.45.11.1868
Vol. 45, No. 11, pp. 1868-1877, Nov. 2020
10.7840/kics.2020.45.11.1868
Implementation of Flexible Test Bed for Cyber Attack Prediction and Countermeasure
Han-Eul Ryu Sung-Goo Jun Shin-Woo Shim Sun-Young Im In-Sung Han
Haeng-Rok Oh
Vol. 44, No. 9, pp. 1723-1729, Sep. 2019
10.7840/kics.2019.44.9.1723
Haeng-Rok Oh
Vol. 44, No. 9, pp. 1723-1729, Sep. 2019
10.7840/kics.2019.44.9.1723