This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
class:gradcompsec2022 [2022/11/23 11:24] jimin1708 [Agenda] |
class:gradcompsec2022 [2025/10/13 12:45] (current) |
||
|---|---|---|---|
| Line 48: | Line 48: | ||
| | ::: | Suwon | | {{ :class:1-s2.0-s0167404821004053-main.pdf |}} | {{ :class:automated-analysis-of-malicious-microsoft-office-documents.pptx |}} | | | ::: | Suwon | | {{ :class:1-s2.0-s0167404821004053-main.pdf |}} | {{ :class:automated-analysis-of-malicious-microsoft-office-documents.pptx |}} | | ||
| | 11/16 | No Class | | | | | | 11/16 | No Class | | | | | ||
| - | | 11/21 3pm | Soyoung | | {{ :class:수정_가능한_블록체인_기반_권한_변경.pdf |}} | | | + | | 11/21 3pm | Soyoung | | {{ :class:수정_가능한_블록체인_기반_권한_변경.pdf |}} | {{ :class:3.수정가능한블록체인기반권한변경및접근제어시스템.pptx |}} | |
| | ::: | Hoguk | | {{ :class:detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pdf |}} | {{ :class:detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pptx |}} | | | ::: | Hoguk | | {{ :class:detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pdf |}} | {{ :class:detection-of-cybersecurity-spoofing-attacks-in-vehicular-networks-with-recurrence-quantification-analysis.pptx |}} | | ||
| - | | 11/23 | Sam | | | | | + | | 11/23 | Sam | | {{ :class:targeted-deanonymization-via-the-cache-side-channel-attacks-and-defenses.pdf |}} | {{ :class:targeted_deanonymization_via_the_cache_side_channel_abdusamatov_somon_.pptx |}} | |
| - | | ::: | Eun | | {{ :class:인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pdf |}} | | | + | | ::: | Eun | | {{ :class:인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pdf |}} | {{ :class:인공지능기술의_iot_통합보안관제를_위한_데이터모델링.pptx |}} | |
| - | | 11/30 | Jimin | | {{ :class:sdn에서의_보안_시스템_부하_감소_기법.pdf |}} | | | + | | 11/30 | Jimin | | {{ :class:sdn에서의_보안_시스템_부하_감소_기법.pdf |}} | {{ :class:sdn에서의_보안_시스템_부하_감소_기법.pptx |}} | |
| - | | ::: | Suwon | | | | | + | | ::: | Suwon | | {{ :class:1-s2.0-s0167404822001407-main.pdf |}} | {{ :class:wasmati.pptx |}} | |
| - | | 12/7 | Soyoung | | {{ :class:4._apt_공격_사례_기반_보안_요구사항_추천_프레임워크.pdf |}} | | | + | | 12/7 | Soyoung | | {{ :class:4.보안_메시징_프로토콜_mls에서_관리자에_메시지_노출에_관한_연구.pdf |}} | | |
| - | | ::: | Hoguk | | | | | + | | ::: | Hoguk | | {{ :class:cyberphysical-security-of-powertrain-systems-in-modern-electric-vehicles-vulnerabilities-challenges-and-future-visions.pdf |}} | {{ :class:cyberphysical_security_of_powertrain_systems_80221115_이호국.pptx |}} | |