咨询与建议

限定检索结果

文献类型

  • 34 篇 会议
  • 19 篇 期刊文献

馆藏范围

  • 53 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 23 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 7 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 农业工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 11 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 7 篇 法学
    • 6 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 5 篇 internet of thin...
  • 5 篇 deep learning
  • 5 篇 security
  • 5 篇 artificial intel...
  • 4 篇 privacy
  • 3 篇 machine learning
  • 2 篇 knowledge engine...
  • 2 篇 reliability
  • 2 篇 smart contracts
  • 2 篇 data privacy
  • 2 篇 anomaly detectio...
  • 2 篇 land mobile radi...
  • 2 篇 companies
  • 2 篇 standardization
  • 2 篇 fuzzing
  • 2 篇 smart contract
  • 2 篇 process control
  • 2 篇 market research
  • 2 篇 metaverse
  • 2 篇 data acquisition

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 6 篇 sejong universit...
  • 5 篇 protocol enginee...
  • 5 篇 sejong universit...
  • 4 篇 dept. of compute...
  • 3 篇 department of in...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 2 篇 sejong universit...
  • 2 篇 department of co...
  • 2 篇 sejong universit...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of in...
  • 2 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of so...

作者

  • 11 篇 lee jong-hyouk
  • 11 篇 jong-hyouk lee
  • 8 篇 hyoung-kyu song
  • 7 篇 young-gab kim
  • 5 篇 park jaehyoung
  • 4 篇 kwon soonhong
  • 4 篇 jihye kim
  • 4 篇 jaehyoung park
  • 4 篇 seungchan woo
  • 4 篇 kim jihye
  • 4 篇 young-hwan you
  • 4 篇 lee taeyang
  • 4 篇 soonhong kwon
  • 3 篇 deok-han kim
  • 3 篇 wooyoung son
  • 3 篇 ki-woong park
  • 3 篇 jae-hyun ro
  • 3 篇 woo seungchan
  • 2 篇 taeyang lee
  • 2 篇 son wooyoung

语言

  • 51 篇 英文
  • 2 篇 其他
检索条件"机构=Department of Computer and Information Security and Convergence Engineering for Intelligent Drone"
53 条 记 录,以下是1-10 订阅
排序:
AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3371-3393页
作者: Juhwan Kim Baehoon Son Jihyeon Yu Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Republic of Korea
Digital forensics aims to uncover evidence of cybercrimes within compromised *** cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised **... 详细信息
来源: 评论
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3291-3315页
作者: Jihyeon Yu Juhwan Kim Youngwoo Lee Fayozbek Rustamov Joobeom Yun Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer and Information Security Sejong UniversitySeoul05006Korea
Internet of things(IoT)devices are being increasingly used in numerous ***,the low priority on security and various IoT types have made these devices vulnerable to *** prevent this,recent studies have analyzed firmwar... 详细信息
来源: 评论
Privacy Enhanced P2P Power Trading Using DID-Based Identity Verification in a Microgrid  25th
Privacy Enhanced P2P Power Trading Using DID-Based Identity ...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Lee, Taeyang Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of
Smart meters play a crucial role in accurately measuring power usage and distribution data in microgrids. However, fine-grained data collection raises significant privacy concerns. To address this, it is essential to ... 详细信息
来源: 评论
Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3401-3424页
作者: Jun-Seob Kim Ki-Woong Park Department of Computer and Information Security and Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A ransomware attack that interrupted the operation of Colonial Pipeline(a large *** pipeline company),showed that security threats by malware have become serious enough to affect industries and social infrastructure r... 详细信息
来源: 评论
security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing  25th
Security Function for 5G-Advanced and 6G: Malicious UE Det...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Park, Jaehyoung Kim, Jihye Lee, Jong-Hyouk Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate log... 详细信息
来源: 评论
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach  25th
ARP Spoofing Mitigation for the E2 Interface in Open RAN:...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has relea... 详细信息
来源: 评论
A Method for De-Identification Analysis of Encrypted Video  9
A Method for De-Identification Analysis of Encrypted Video
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Kim, Deok-Han Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of
As the variety of video content increases, so does the likelihood of data breaches of sensitive personal information. Consequently, several video de-identification techniques have been developed to protect personal da... 详细信息
来源: 评论
Improved MIMO Signal Detection Based on DNN in MIMO-OFDM System
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3625-3636页
作者: Jae-Hyun Ro Jong-Gyu Ha Woon-Sang Lee Young-Hwan You Hyoung-Kyu Song Department of Convergence Engineering for Intelligent Drone Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
This paper proposes the multiple-input multiple-output(MIMO)detection scheme by using the deep neural network(DNN)based ensemble machine learning for higher error performance in wireless communication *** the MIMO det... 详细信息
来源: 评论
Efficient Gauss-Seidel Precoding with Parallel Calculation in Massive MIMO Systems
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 491-504页
作者: Hyun-Sun Hwang Jae-Hyun Ro Chan-Yeob Park Young-Hwan You Hyoung-Kyu Song Department of Information and Communication Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Convergence Engineering for Intelligent Drone Sejong UniversitySeoul05006Korea Department of Computer Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea
A number of requirements for 5G mobile communication are satisfied by adopting multiple input multiple output(MIMO)*** inter user interference(IUI)which is an inevitable problem in MIMO systems becomes controllable wh... 详细信息
来源: 评论
Plotting OSS-Based Supply Chain Attack Strategies and the Defense Failure  25th
Plotting OSS-Based Supply Chain Attack Strategies and the ...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Sarang, Arpita Dinesh Choi, Sang-Hoon Park, Ki-Woong SysCore Lab Department of Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of SysCore Lab Sejong University Seoul05006 Korea Republic of Department of Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
The supply chain attack, which targets open-source software, is currently the most discussed cyberattack. This is due to the recent open-source XZ utils and PyPI projects based attacks where the attackers employed sim... 详细信息
来源: 评论