Graduate School of Information Security

  • Korea, Republic of

Fingerprint Dive into the research topics where Graduate School of Information Security is active. These topic labels come from the works of this organisation's members. Together they form a unique fingerprint.

Cryptography Engineering & Materials Science
Attack Mathematics
Authentication Engineering & Materials Science
Servers Engineering & Materials Science
Cloud computing Engineering & Materials Science
Network protocols Engineering & Materials Science
Mobile devices Engineering & Materials Science
Hash functions Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1995 2019

  • 10259 Citations
  • 47 h-Index
  • 525 Article
  • 476 Conference contribution
  • 6 Editorial
  • 3 Chapter

ADSaS: Comprehensive real-time anomaly detection system

Lee, S. & Kim, H. K., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 29-41 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anomaly Detection
Real-time
Anomaly
Time series
Moving Average Model

Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning

Baek, H., Joo, M., Park, W., You, Y. & Lee, K. H., 2019 Mar 18, 2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8669424. (2019 International Conference on Platform Technology and Service, PlatCon 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Learning systems
Mobile devices
Decision making
Android (operating system)

A new bayesian approach to exploring damaged assets by monitoring mission failures caused by undetected attack

Shim, S. & Yoon, J. W., 2019 Jan 1, Information Security Applications - 19th International Conference, WISA 2018, Revised Selected Papers. Kang, B. B. & Jang, J. (eds.). Springer Verlag, p. 185-196 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11402 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian networks
Bayesian Approach
Computer systems
Attack
Monitoring