咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 127 篇 会议
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 197 篇 工学
    • 145 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 54 篇 信息与通信工程
    • 41 篇 电气工程
    • 34 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 17 篇 安全科学与工程
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 土木工程
  • 87 篇 理学
    • 54 篇 数学
    • 23 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 系统科学
    • 5 篇 化学
  • 58 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 15 篇 法学
    • 10 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 12 篇 deep learning
  • 11 篇 blockchain
  • 10 篇 authentication
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 training
  • 8 篇 internet of thin...
  • 8 篇 artificial intel...
  • 8 篇 privacy
  • 6 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 blockchains
  • 4 篇 access control
  • 4 篇 data privacy
  • 4 篇 optimization
  • 4 篇 smart contract
  • 4 篇 encryption
  • 4 篇 data models
  • 4 篇 forensics
  • 3 篇 intrusion detect...

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 cyber security d...
  • 8 篇 computer enginee...
  • 7 篇 department of co...
  • 7 篇 school of cyber ...
  • 6 篇 department of co...
  • 6 篇 national yunlin ...
  • 6 篇 sejong universit...
  • 5 篇 the university o...
  • 5 篇 protocol enginee...
  • 5 篇 school of comput...
  • 5 篇 sejong universit...
  • 5 篇 university of el...
  • 5 篇 school of comput...
  • 5 篇 peng cheng labor...
  • 5 篇 beijing key labo...
  • 5 篇 school of comput...
  • 4 篇 ghana technology...
  • 4 篇 information secu...

作者

  • 16 篇 das ashok kumar
  • 14 篇 mahmood khalid
  • 12 篇 jong-hyouk lee
  • 11 篇 lee jong-hyouk
  • 9 篇 fan chun-i
  • 9 篇 gong chen
  • 8 篇 kim tai-hoon
  • 8 篇 hyoung-kyu song
  • 7 篇 bhattacharyya de...
  • 7 篇 cao xiaochun
  • 6 篇 young-gab kim
  • 6 篇 yang jian
  • 6 篇 shamshad salman
  • 6 篇 xu qianqian
  • 5 篇 jihye kim
  • 5 篇 yang zhiyong
  • 5 篇 jaehyoung park
  • 5 篇 huang qingming
  • 5 篇 park jaehyoung
  • 5 篇 saleem muhammad ...

语言

  • 243 篇 英文
  • 49 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer and Information Security & Convergence Engineering for Intelligent"
296 条 记 录,以下是1-10 订阅
排序:
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3371-3393页
作者: Juhwan Kim Baehoon Son Jihyeon Yu Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Republic of Korea
Digital forensics aims to uncover evidence of cybercrimes within compromised *** cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised **... 详细信息
来源: 评论
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3291-3315页
作者: Jihyeon Yu Juhwan Kim Youngwoo Lee Fayozbek Rustamov Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer and Information Security Sejong UniversitySeoul05006Korea
Internet of things(IoT)devices are being increasingly used in numerous ***,the low priority on security and various IoT types have made these devices vulnerable to *** prevent this,recent studies have analyzed firmwar... 详细信息
来源: 评论
Privacy Enhanced P2P Power Trading Using DID-Based Identity Verification in a Microgrid  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Lee, Taeyang Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of
Smart meters play a crucial role in accurately measuring power usage and distribution data in microgrids. However, fine-grained data collection raises significant privacy concerns. To address this, it is essential to ... 详细信息
来源: 评论
Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3401-3424页
作者: Jun-Seob Kim Ki-Woong Park Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A ransomware attack that interrupted the operation of Colonial Pipeline(a large *** pipeline company),showed that security threats by malware have become serious enough to affect industries and social infrastructure r... 详细信息
来源: 评论
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has relea... 详细信息
来源: 评论
security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Park, Jaehyoung Kim, Jihye Lee, Jong-Hyouk Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate log... 详细信息
来源: 评论
A Method for De-Identification Analysis of Encrypted Video  9
A Method for De-Identification Analysis of Encrypted Video
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Kim, Deok-Han Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of
As the variety of video content increases, so does the likelihood of data breaches of sensitive personal information. Consequently, several video de-identification techniques have been developed to protect personal da... 详细信息
来源: 评论
Simulation of an ARP Spoofing Attack on the E2 Interface in Open RAN  35
Simulation of an ARP Spoofing Attack on the E2 Interface in ...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Seoul Korea Republic of
In anticipation of the 5G-Advanced and 6G era, this paper explores Open RAN as an innovative solution to enhance the existing Radio Access Network (RAN) capabilities, particularly in managing the surge in mobile traff... 详细信息
来源: 评论
MV-Honeypot:security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 655-669页
作者: Arpita Dinesh Sarang Mohsen Ali Alawami Ki-Woong Park SysCore Lab.(Convergence Engineering for Intelligent Drone) Sejong UniversitySeoul05006Republic of Korea Division of Computer Engineering Hankuk University of Foreign StudiesYongin-si17035Republic of Korea Department of Information Security Sejong UniversitySeoul05006Republic of Korea
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various ***,the Avatar and Metaverse are being ... 详细信息
来源: 评论
A Self-Adaptive Access Control Framework Based on User Attributes Among Heterogeneous Internet of Things Platforms  9
A Self-Adaptive Access Control Framework Based on User Attri...
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Park, Jihoon Koo, Jahoon Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of
Internet of Things (IoT) platforms are being actively designed to provide various services to users. However, most IoT platforms are developed in independent environments, causing difficulties in their interoperabilit... 详细信息
来源: 评论