About the Journal


Read More

Current Issue

Vol. 10 (2024)

Published: 2024-03-24

Articles

Malicious Packet Detection Technology Using Reinforcement Learning

ByungWook An (NCsoft, Korea, Korea, Republic of)
JoongChan Lee (Department of Artificial Intelligence Convergence, Hanyang University, Korea , Korea, Republic of)
JaiSung Choi (Security Group Moby Dick, Korea, Korea, Republic of)
Wonhyung Park (Department of Convergence Security at Sungshin Women's University, Korea , Korea, Republic of)
PDF

Page 1-29

Implementation and Evaluation of Mutual Authentication Protocol for Artificial Pancreas System

Hoseok Kwon (Financial Information Security, Kookmin University, Seoul, Republic of Korea, Korea, Republic of)
Youngsin Park (Information Security and Cryptography, Kookmin University, Seoul, Republic of Korea, Korea, Republic of)
Jiyoon Kim (School of Computer Science, Gyeonsang National University, Seoul, Republic of Korea, Korea, Republic of)
Ilsun You (Information Security and Cryptography, Kookmin University, Seoul, Republic of Korea, Korea, Republic of)
PDF

Page 30-35

Predictive Analytics in Law Enforcement: Unveiling Patterns in NYPD Crime through Machine Learning and Data Mining

Jisha Sheela Kumar (Department of Computer Science, West Chester University, United States)
Md Amiruzzaman (Department of Computer Science, West Chester University, United States)
Ashik Ahmed Bhuiyan (Department of Computer Science, West Chester University, United States)
Deepshikha Bhati (Department of Computer Science, Kent State University, United States)
PDF

Page 36-59

Implementation of the Drowsy Driving Prevention System using AI-Based Conversations to Maintain Driver Arousal

Noriki Uchida (Fukuoka Institute of Technology, Fukuoka, Japan)
Tomoyuki Ishida (Fukuoka Institute of Technology, Fukuoka, Japan)
Yoshitaka Shibata (Iwate Prefectural University, Takizawa, Japan)
PDF

Page 60-69

Analyzing the Impact of Smoking and Drinking on Health Metrics in Korea: A Data-driven Predictive Approach

Priyanka Logasubramanian (Department of Computer Science, West Chester University, United States)
Md Amiruzzaman (Department of Computer Science, West Chester University, United States)
Ashik Ahmed Bhuiyan (Department of Computer Science, West Chester University, United States)
PDF

Page 70-81

Implementation and Evaluation of Pull-type Rationed Goods Request Framework

Yuta Seri (Graduate School of Engineering, Fukuoka Institute of Technology, Japan)
Tomoyuki Ishida (Department of Information and Communication Engineering, Fukuoka Institute of Technology, Japan)
PDF

Page 82-110

Survey on Security for Non-Terrestrial Networks

Seungbin Lee (Gyeongsang National University, Jinju, Korea, Republic of)
Jiyoon Kim (Gyeongsang National University, Jinju, Korea, Republic of)
PDF

Page 111-123

Development of Scene Segmentation to Improve Work Efficiency of Learner Monitoring

Kaoru Sugita (Fukuoka Institute of Technology, Fukuoka, Japan)
PDF

Page 124-133

Security Analysis of Network Slicing-based Mission-Critical Services with Formal Verification Tool

KyeongA Kang (Gyeongsang National University, Jinju, Korea, Republic of)
Seungbin Lee (Gyeongsang National University, Jinju, Korea, Republic of)
Jiyoon Kim (Gyeongsang National University, Jinju, Korea, Republic of)
PDF

Page 134-143

Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis

Keke Feng (School of Electronic and Information Engineering, Beijing Jiaotong University, China)
Huachun Zhou (School of Electronic and Information Engineering, Beijing Jiaotong University, China)
Weilin Wang (School of Electronic and Information Engineering, Beijing Jiaotong University, China)
Jingfu Yan (School of Electronic and Information Engineering, Beijing Jiaotong University, China)
Xiaojing Fan (School of Electronic and Information Engineering, Beijing Jiaotong University, China)
PDF

Page 144-168

View All Issues