Digital Library[ Search Result ]
Search : "[ keyword: BER ]" (120)
A Study on the Improvement of the National Cyber Security Policy Against the Spread of Ransomware Damage
Jinmin Kim Daehyun Kwon Seunghyun Joo Yongtae Shin
Vol. 47, No. 11, pp. 1932-1948, Nov. 2022
10.7840/kics.2022.47.11.1932
Vol. 47, No. 11, pp. 1932-1948, Nov. 2022
10.7840/kics.2022.47.11.1932
Proposal of Law Amendment for Secure Management and Preservation of EMR
Trends in Autonomous Course of Action for Cyber Attacks Using Reinforcement Learning
Seok Bin Son Haemin Lee Soohyun Park Dong Hwa Kim Joongheon Kim
Vol. 47, No. 11, pp. 1776-1787, Nov. 2022
10.7840/kics.2022.47.11.1776
Vol. 47, No. 11, pp. 1776-1787, Nov. 2022
10.7840/kics.2022.47.11.1776
Decoding Process of RS Codes with Errors and Erasures: An Overview
Zhi Jing Hyojeong Choi Hong-Yeop Song
Vol. 47, No. 11, pp. 1747-1754, Nov. 2022
10.7840/kics.2022.47.11.1747
Vol. 47, No. 11, pp. 1747-1754, Nov. 2022
10.7840/kics.2022.47.11.1747
An Optimal Mobile Subscriber Access Points Deployment Technique for Next-Generation Tactical Mobile Communication Systems
Ki-Hun Lee Gyudong Park Gi-Yoon Jeon Byungchun Jeon Bang Chul Jung
Vol. 47, No. 4, pp. 603-606, Apr. 2022
10.7840/kics.2022.47.4.603
Vol. 47, No. 4, pp. 603-606, Apr. 2022
10.7840/kics.2022.47.4.603
A Study of Detecting Lateral Movement Using Large-Scale Authentication Log
Shinwoo Shim Sang-soo Kim Sun-Young Im Sung-mo Koo Byoungmo Cho
Kwangsoo Kim Taekyu Kim
Vol. 46, No. 11, pp. 1862-1872, Nov. 2021
10.7840/kics.2021.46.11.1862
Kwangsoo Kim Taekyu Kim
Vol. 46, No. 11, pp. 1862-1872, Nov. 2021
10.7840/kics.2021.46.11.1862
A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting
Sang-soo Kim Shinwoo Shim Sun-Young Im Sung-mo Koo
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
10.7840/kics.2021.46.11.1853
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
10.7840/kics.2021.46.11.1853