|
2022
|

|
KNOM Review Vol. 25, No. 2, December 2022
(Download)
Guest Editor: Prof. Myungsup Kim, Korea Univ., KOREA
ISSN 2287-1543 (Online)
|
IBN@TEIN: QoS Assurance¸¦ ÅëÇÑ ¼ºñ½º ±¸ÃàÀ» À§ÇÑ AI ±â¹Ý Àǵµ ±â¹Ý ³×Æ®¿öÅ· Ç÷§Æû
(IBN@TEIN: An AI-driven Intent-based Networking Platform for Service Deployment with QoS Assurance)
¹Ì¸£ ¹«ÇÔ¸¶µå ¼ú·¡¸¸ »ç¸£¿ö, »çÁöµå ¾Ë¶÷, ¾ÆÆÅ ¹«Çϸ¶µå, ¼Û¿Õö, KNOM Review, Vol.25, No. 2, Dec. 2022, pp.1-9
µö·¯´× ±â¹Ý ³×Æ®¿öÅ© °ø°Ý ¹× ħÀÔ Å½Áö ¹æ¹ý ¿¬±¸
(A Study of Network Attack and Intrusion Detection Method using Deep Learning)
È«Áö¹ü, ÃÖ¹ÎÁö, À¯ÀçÇü, È«¿ø±â, KNOM Review, Vol.25, No. 2, Dec. 2022, pp.10-21
ºÐÇÒ NFT ±â¼ú¿¡ ´ëÇÑ ¿¬±¸¿Í Ȱ¿ë ¹æ¾È ºÐ¼®
(A Study of Fractional NFT and its Applications)
ÃÖ¿ø¼®, ¿ìÁ¾¼ö, È«¿ø±â, KNOM Review, Vol.25, No. 2, Dec. 2022, pp.22-29
GPU µ¥ÀÌÅÍ Ä³½Ã Á¢±Ù ÆÐÅÏ ¹æ¹ý¿¡ µû¸¥ ¼º´É º¯È ºÐ¼®
(A Performance Benchmark of Cached Data Access Patterns on GPUs)
Å׿Àµµ¶ó ¾ÆµÎǪ, ±èÀ±Èñ, KNOM Review, Vol.25, No. 2, Dec. 2022, pp.30-39
°æ·®È µ¥ÀÌÅÍ¿Í µö·¯´× ¸ðµ¨À» Àû¿ëÇÑ È¿À²ÀûÀÎ ³×Æ®¿öÅ© Æ®·¡ÇÈ ºÐ·ù ¹æ¹ý
(Efficient Network Traffic Classification Method Using Lightweight Data and Deep Learning Model)
½ÅâÀÇ, ¹ÚÁöÅÂ, ¹éÀÇÁØ, ÃÖÁ¤¿ì, ±è¸í¼·, KNOM Review, Vol.25, No. 2, Dec. 2022, pp.40-50
³×Æ®¿öÅ© Æ®·¡ÇÈ ºÐ¼®À» ÅëÇÑ ±ÔÄ¢ ±â¹Ý »ç¿ëÀÚ ÇàÀ§ ŽÁö ½Ã½ºÅÛ ¼³°è
(A Design of Rule-based User Action Detection System for Network Traffic Analysis)
¹ÚÁöÅÂ, ½ÅâÀÇ, ¹éÀÇÁØ, ÃÖÁ¤¿ì, ±è¸í¼·, KNOM Review, Vol.25, No. 2, Dec. 2022, pp.51-58
|
|

|
KNOM Review Vol. 25, No. 1, August 2022
(Download)
Guest Editor: Prof. Myungsup Kim, Korea Univ., KOREA
ISSN 2287-1543 (Online)
|
ºÐÇÒÀû ±ºÁýÈ ±â¹Ý ¼³ºñ Àå¾Ö ÀÌ»ó °¨Áö ¾Ë°í¸®Áò
(An Algorithm for Detecting Equipment Fault Anomaly Based on Partitional Clustering)
Á¶ÀçÇü, ÀÌÀç¿À, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp. 1-8
´ë¿ë·® ½ºÅ丮Áö¸¦ Áö¿øÇÏ´Â ºí·ÏüÀÎ È®Àå ±â¹ý
(Blockchain scalability technique that supports large-capacity storage)
³ªµ¿ÁØ, ¹Ú¼¼Áø, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp.9-15
DID¿Í Çã°¡Çü ºí·ÏüÀÎÀ» Ȱ¿ëÇÑ °³ÀÎÁ¤º¸ ÁÖ±ÇÈ ¹× ÀÌ·ÂÃßÀû ½Ã½ºÅÛ ¼³°è
(Personal Data Sovereignty and Tracking System using Decentralized Identifier and Permissioned Blockchain)
±èÁ¤Çå, ¿ìÁ¾¼ö, È«¿ø±â, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp. 16-27
°ÈÇнÀÀ» ÀÌ¿ëÇÑ ¿§Áö ÄÄÇ»ÆÃ ȯ°æ¿¡¼ÀÇ Live Migration Á¤Ã¥ Á¦¾î ¿¬±¸
(A Study of Live Migration Policy Control in Edge Computing Environment using Reinforcement Learning)
Á¤¼¼¿¬, È«Áö¹ü, À¯ÀçÇü, È«¿ø±â, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp. 28-36
BiLSTM ±â¹ÝÀÇ ¾Ç¼º ÆÄÀÏ ÀÚµ¿ ŽÁö ¹× ºÐ·ù ¹æ¾È ¿¬±¸
(A study on the Automatic Detection and Classification of Malware based on BiLSTM)
±èÁ¾¿í, ÃÖ¹ÌÁ¤, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp. 37-48
½º¸¶Æ® ÄÁÆ®·¢Æ® Ãë¾àÁ¡ ŽÁö µµ±¸ µ¿Ç⠺м®
(Smart Contract Vulnerability Detection Tool Trend Analysis)
¹æÁö¿ø, ÃÖ¹ÌÁ¤, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp. 49-61
GPU ¸Þ¸ð¸®ÀÇ Á¢±Ù ´Ù¾ç¼ºÀ» °¡Áø ¿öÅ©·Îµå¿¡ ´ëÇÑ µ¥ÀÌÅÍ Áö¿ª¼º ºÐ¼® ½ÇÇè
(Empirical experiments of profiled data locality for memory-divergent workloads on GPU)
±èÁöÀº, ½ÅÇöÀÏ, ¾öÇö»ó, ±èÀ±È¸, KNOM Review, Vol. 25, No. 1, Aug. 2022, pp. 62-70
|
|