Mobile QR Code QR CODE : The Transactions P of the Korean Institute of Electrical Engineers
The Transactions P of the Korean Institute of Electrical Engineers

Korean Journal of Air-Conditioning and Refrigeration Engineering

ISO Journal TitleTrans. P of KIEE
  • Indexed by
    Korea Citation Index(KCI)

References

1 
Wang Xinran, Kohno Tadayoshi, Blakley Bob, 2014, Poly- morphism as a Defense for Automated Attack of Websites, in Int. Conf. on Appl. Cryptography and Netw. Secur., pp. 513-530DOI
2 
Goedde Amanda, Jul 2020, Credential Stuffing in the Media Industry, Akamai, [Online]. Available: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-credential-stuffing-in-the-media-industry-report-2020.pdfGoogle Search
3 
J.-H. Ki, Sep 2017, The Past and Present of Authentication Technology, ITFIND, pp. 13-22Google Search
4 
Ometov Aleksandr, Jan 2018, Multi-Factor Authentication: A Survey, Cryptography, Vol. 2, No. 1, pp. 1-31DOI
5 
Wiefling Stephan, Lo Iacono Luigi, 2019, Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the Wild, IFIP Adv. in Inf. and Commun. Technol., Vol. 562, pp. 134-148DOI
6 
Wiefling Stephan, Dürmuth Markus, Lo Iacono Luigi, 2020, More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication, arXiv:2010.00339DOI
7 
Jonghyun Lee, 2020, Exploring the prediction model for middle school low-performing students ratio in mathematics using machine learning, Ph.D. dissertation, Youngnam University, Daegu, KoreaGoogle Search
8 
Yunhye Oh, 2019, Comparative experiment of Logistic Regression and Machine Learning Performance of Support Vector Machines, M.S. thesis, Kookmin University, Seoul, KoreaGoogle Search
9 
Jiacang Ho, Dae-Ki Kang, 2015, Sequence Alignment with Dynamic Divisor Generation for Keystroke Dynamics Based User Authentication, J. of Sensors, Vol. 2015, pp. 1-14DOI
10 
Raul Nataasha, D’mello Royston, Bhalerao Mander, 2019, Keystroke Dynamics Authentication Using Small Datasets, Commun. in Comput. and Inf. Sci., Vol. 939, pp. 89-96DOI
11 
Pilseong Kang, Seongjun Cho, 2012, A Study on User Authentication based on Keystroke Dynamics of Long and Free Texts, IE interface, Vol. 25, No. 3, pp. 290-299DOI
12 
Sepczuk Mariusz, Kotulski Zbigniew, 2018, A new risk- based authentication management model oriented on user’s experience, Comput. & Secur., Vol. 73, pp. 17-33DOI
13 
2019, Network intrusion detection system using machine learning algorithm, M.S. thesis, Sungkyunkwan University, Seoul, KoreaDOI