Abstract is missing.
- Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking DeploymentAziz Mohaisen, Ah Reum Kang, Kui Ren. 1-14 [doi]
- Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacksan Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen. 15-28 [doi]
- SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDNXinyu Liu, Beumjin Cho, Jong Kim. 29-41 [doi]
- Slowloris DoS Countermeasure over WebSocketJongseok Choi, Jong-Gyu Park, Shinwook Heo, Namje Park, Howon Kim. 42-53 [doi]
- Detecting Encrypted Traffic: A Machine Learning ApproachSeunghun Cha, Hyoungshick Kim. 54-65 [doi]
- Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow AttacksIvan Homoliak, Ladislav Sulak, Petr Hanácek. 66-78 [doi]
- A Behavior-Based Online Engine for Detecting Distributed Cyber-AttacksYaokai Feng, Yoshiaki Hori, Kouichi Sakurai. 79-89 [doi]
- Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation RateSu-kyung Kown, Bongsoo Jang, Byoung-Dai Lee, Younghae Do, Hunki Baek, Yoon Ho Choi. 90-101 [doi]
- Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber CapabilitiesJeong Yoon Yang, So-Jeong Kim, Il Seok Oh(Luke). 102-111 [doi]
- A Practical Analysis of TLS Vulnerabilities in Korea Web EnvironmentJongMin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur. 112-123 [doi]
- Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share AttackYujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim. 124-135 [doi]
- Detecting Impersonation Attack in WiFi Networks Using Deep Learning ApproachMuhamad Erza Aminanto, Kwangjo Kim. 136-147 [doi]
- Pay as You Want: Bypassing Charging System in Operational Cellular NetworksHyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim. 148-160 [doi]
- Towards Automated Exploit Generation for Embedded SystemsMatthew Ruffell, Jin B. Hong, Hyoungshick Kim, Dong Seong Kim. 161-173 [doi]
- Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?Sanghak Oh, Eunsoo Kim, Hyoungshick Kim. 174-185 [doi]
- Development of Information Security Management Assessment Model for the Financial SectorEun Oh, Tae Sung Kim, Tae-Hee Cho. 186-197 [doi]
- A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and FairnessJisoo Jung, Joo-Im Kim, Ji Won Yoon. 198-209 [doi]
- GIS Vector Map Perceptual Encryption Scheme Using Geometric ObjectsPham Ngoc Giao, Suk Hwan Lee, Kwang-Seok Moon, Ki-Ryong Kwon. 210-220 [doi]
- Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18Md. Al-Amin Khandaker, Yasuyuki Nogami, Hwajeong Seo, Sylvain Duquesne. 221-232 [doi]
- LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)Xiaoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang, Siu-Ming Yiu. 233-244 [doi]
- Revocable Group Signatures with Compact Revocation List Using Vector CommitmentsShahidatul Sadiah, Toru Nakanishi 0001. 245-257 [doi]
- The Quantum-Safe RevolutionJean-Charles Faugère, Ludovic Perret. 258-266 [doi]
- New Integral Characteristics of KASUMI Derived by Division PropertyNobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi. 267-279 [doi]
- On Pseudorandomness in Stateless SourcesMaciej Skorski. 280-291 [doi]
- Algebraic Degree Estimation for Integral Attack by Randomized AlgorithmHaruhisa Kosuge, Hidema Tanaka. 292-304 [doi]
- Applications of Soft Computing in CryptologyStjepan Picek. 305-317 [doi]
- Parallel Implementations of LEA, RevisitedHwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim. 318-330 [doi]
- Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step ForwardHwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim. 331-340 [doi]
- A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix TransformationAbayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod. 341-352 [doi]
- Exploration of 3D Texture and Projection for New CAPTCHA DesignSimon S. Woo, Jingul Kim, Duoduo Yu, Beomjun Kim. 353-365 [doi]
- A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile EnvironmentSung-Hoon Lee, Jong-Hyuk Roh, Soo-Hyung Kim, Seung Hun Jin. 366-375 [doi]
- Geocasting-Based Almanac Synchronization Method for Secure Maritime CloudDonghyeok Lee, Namje Park. 376-387 [doi]
- The Vessel Trajectory Mechanism for Marine Accidents AnalysisSeung-Hee Oh, Byung Gil Lee, ByungHo Chung. 388-396 [doi]