최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.3, 2023년, pp.499 - 510
박용주 (고려대학교 정보보호대학원) , 김휘강 (고려대학교 정보보호대학원)
Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but...
Korea Internet & Security Agency,"?2021 Information Security Survey Report," Jan. 2021.
Tae ho Kim, "Feature Selection Optimization in Unsupervised Learning for Insider threat Detection,"?Korea University master thesis, Jun.2018.
Hong Koo Kang, Sam Shin Shin, Dae Yeob Kim, Soon Tai Park, "Design and Implementation of Malicious URL Prediction System based on Multiple Machine Learning Algorithms", Journal of Korea Multimedia Society Vol. 23, No. 11,pp. 1396-1405, Nov. 2020.
In Jae Son, Huy Kang Kim, ,"A Study on the Abnormal Behavior Detection Model through Data Transfer", Journal of The Korea Institute of?Information Security &Cryptology VOL.30, NO.4, Aug. 2020.
Hyun Song Jang, "Data-mining Based?Anomaly Detection in Document?Management System," Journal of?Knowledge Information Technology?and Systems(JKITS), Vol. 10, No. 4,?pp. 465-473, Aug. 2015.
Hae-dong Kim, "Insider Threat?Detection based on User Behavior?Model and Novelty Detection?Algorithms", Journal of the Korean?Institute of Industrial Engineers?Vol.43, No.4, pp. 276-278, Aug. 2017.
Eldardiry, H., Sricharn, k., Liu, j.,?Hanley, J., Price, B., Brdiczka, O., &?Bart, E., "Multi-source fusion for?anomaly detection: using across-domain and across-timepeer-group?consistency checks", Palo Alto?Research Center, Jun. 2014.
Le Zhang, Jingbo Zhu, and Tianshun?Yao, "An Evaluation of statistical?spam filtering techniques," ACM?Transaction on Asian Language?Information Processing, 2006.
Vangelis Metsis, "Spam Filtering with?NaiveBayes-Which Naive Bayes?,"?CEAS, June. 2006.
Miae Oh, "A Study on anomaly?detection based on MachineLearning",?Korea Institute for Health and Social?Affairs, Dec. 2018.
Moo-Hun Lee, Min-Gyu Kim,?"Meteorological Information Analysis?Algorithm based on Weight for?Outdoor Activity Decision-Making",?Mar. 2016.
William W. Cohen, "Fast Effective?Rule Induction", International?Conference on Machine Learning, pp.?15-123, July. 1995.
Indre Zliobaite, Albert Bifet, Bernhard Pfahringer, and Geoff Holmes, "Active learning with drifting streaming data", IEEE Transactions on Neural?Networks and Learning Systems, Vol.25, No. 1, pp. 27-39, Jan. 2013.
N. Bhatia, "Survey of Nearest Neighbor Techniques", International?Journal of Computer Science and Information Security, Vol. 8, No. 2, Jul. 2010.
D. Aha, D. Kibler, "Instance-based learning algorithms". Machine Learning. pp. 37-66, Jan. 1991.
Deza, M.; Deza, E. "Encyclopedia of Distances", Springer-Verlag, pp.94, Jan. 2009.
David M. J. Tax, Robert Duin, and Dick De Ridder, "Classification, Parameter Estimation and State Estimation: An Engineering Approach Using MATLAB", John Wiley and Sons. pp. 440, Sep. 2004.
S.S. Keerthi, S.K. Shevade, C. Bhattacharyya, K.R. K. Murthy," Improvements to Platt's SMO Algorithm for SVM Classifier Design", Neural Computation. Vol. 13, No. 3,pp. 637-649. Mar. 2001.
George H. John, Pat Langley, "Estimating Continuous Distributions in Bayesian Classifiers", Eleventh Conference on Uncertainty in Artificial Intelligence, San Mateo, pp.338-345, Aug. 1995.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.