최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.34 no.1, 2024년, pp.21 - 29
김정윤 (서울과학기술대학교) , 박종열 (서울과학기술대학교) , 오상호 (국립부경대학교)
With the development of ICT and network, security management of IT infrastructure that has grown in size is becoming very difficult. Many companies and public institutions are having difficulty managing system and network security. In addition, as the complexity of hardware and software grows, it is...
Jeong Do Yoo, Eunji Park, "Cyber Attack and Defense Emulation Agents", Applied Sciences, vol. 10, no. 6, Mar., 2020.?
Lee, jung-jai, Jongmin Park, "A Study on Cyber Security Technology", Jounal of The Korea Society of Information Technology Policy & Management (ITPM), pp. 2339-2344, Dec., 2021.?
Ho-Gun Rou, Gwang-Yong Gim, "A Study on Detection Method of Web Attack Using Machine Learning", A Study on Detection Method of Web Attack Using Machine Learning, pp. 1642-1650, Jul., 2020.?
Sang-Jun Lee, MIN KYUNG IL, "Research on Core Technology for Information Security Based on Artificial Intelligence", The Korea Journal of BigData, pp. 99-108, Dec., 2021.?
Chanho Shin, Changhee Choi , "Cyberattack Goal Classification Based on MITRE ATT&CK: CIA Labeling", Journal of Internet Computing and Services, pp. 15-26, Dec., 2022.?
Imatitikua D. Aiyannyo, Hamman Samuel, "A Systematic Review of Defensive and Offensive Cybersecurity with Machine Learning", Applied sciences, vol. 10, no. 17, Aug., 2020.?
KimJaeuk, Laehyun Park, "Analysis of Deep Learning Model Vulnerability According to Input Mutation", Journal of The Korea Institute of Information Security and Cryptology, pp.51-59, Jan., 2021.?
Erich Walter, Kimberly Ferguson-Walter, "Incorporating Deception into CyberBattleSim for Autonomous Defense", arXiv, 2021.?
C.P. Andriotis, K.G. Papakonstantinou, "Managing engineering systems with large state and action spaces through deep reinforcement learning", Reliability Engineering & System Safety, Nov., 2019.?
Doug Miller, Ron Alford, "Automated Adversary Emulation: A Case for Plannig and Acting with Unknowns", DTIC, Jan., 2018?
Erich C. Walter, "Incorporating deception into cyberbattlesim for autonomous defense", arXiv, 2021?
seungeunrho, "Reinforcement Learning from the Floor", youngjin.com, Sep., 2020.?
Microsoft 365 Defender Research Team, https://www.microsoft.com/en-us/security/blog/2021/04/08/gamifying-machine-learning-for-stronger-security-and-ai-models/, Apr., 2021.?
Mitre attack, "technique", https://attack.mitre.org/, Apr., 2023.?
Jungsik Lee, Sung-Young Cho, "A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain", Journal of Internet Computing and Services, pp.41-50, Feb., 2021.?
Barbara Slavin, Jason Healey, "Iran: How a Third Tier Cyber Power Can Still Threaten the United States", ATLANTIC COUNCIL, Jul., 2013.?
Volodymyr Mnih, Koray Kavukcuoglu, David Silver, "Playing Atari with Deep Reinforcement Learning", arXiv, 2013.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.