{"id":4180,"date":"2025-10-12T15:08:00","date_gmt":"2025-10-12T06:08:00","guid":{"rendered":"https:\/\/pel.sejong.ac.kr\/wordpress\/?p=4180"},"modified":"2025-11-21T15:25:25","modified_gmt":"2025-11-21T06:25:25","slug":"ieee-milcom-2025-%ec%b0%b8%ec%84%9d","status":"publish","type":"post","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?p=4180","title":{"rendered":"IEEE MILCOM 2025 \ucc38\uc11d"},"content":{"rendered":"\n<p>2025\ub144 10\uc6d4 6\uc77c(\uc6d4)\ubd80\ud130 10(\uae08)\uae4c\uc9c0, \ubbf8\uad6d LA\uc5d0\uc11c IEEE MILCOM 2025\uac00 \uac1c\ucd5c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. MILCOM(Military Communications Conference)\uc740 \uad6d\ubc29 \ud1b5\uc2e0\uc758 \ub300\ud45c\uc801\uc778 \ud559\uc220\ub300\ud68c\uc774\uba70, PEL\uc5d0\uc11c\ub294 \uad8c\uc21c\ud64d \ud559\uc0dd\uacfc \uc190\uc6b0\uc601 \ud559\uc0dd\uc758 \ub17c\ubb38\uc774 \ubc1c\ud45c\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4.png\"><img loading=\"lazy\" width=\"960\" height=\"720\" src=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-960x720.png\" alt=\"\" class=\"wp-image-4181\" srcset=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-960x720.png 960w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-595x446.png 595w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-768x576.png 768w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-1536x1152.png 1536w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-2048x1536.png 2048w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-2000x1500.png 2000w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/image-4-300x225.png 300w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01.png\"><img loading=\"lazy\" width=\"960\" height=\"586\" src=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01-960x586.png\" alt=\"\" class=\"wp-image-4183\" srcset=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01-960x586.png 960w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01-595x363.png 595w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01-768x469.png 768w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01-1536x937.png 1536w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01-300x183.png 300w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_01.png 1688w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<p>\uad8c\uc21c\ud64d \ud559\uc0dd\uc740 Temporal GNN\uc744 \ud65c\uc6a9\ud55c \ucee8\ud14c\uc774\ub108\ud654 \uc804\ub7b5 \uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \uc774\uc0c1 \ud0d0\uc9c0\uc5d0 \uad00\ud55c \ub17c\ubb38\uc744 \ubc1c\ud45c\ud558\uc600\uc73c\uba70, \ud574\ub2f9 \ub17c\ubb38\uc758 \uc815\ubcf4\ub294 \uc544\ub798\uc640 \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Soonhong Kwon, Wooyoung Son, and Jong-Hyouk Lee, \u201cAnomaly Detection in Containerized Tactical Systems Using Temporal Graph Neural Networks\u201d,\u00a0<em>IEEE Military Communications Conference 2025 (IEEE MILCOM 2025)<\/em>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02.png\"><img loading=\"lazy\" width=\"960\" height=\"660\" src=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-960x660.png\" alt=\"\" class=\"wp-image-4182\" srcset=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-960x660.png 960w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-595x409.png 595w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-768x528.png 768w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-1536x1055.png 1536w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-2048x1407.png 2048w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2025\/11\/KakaoTalk_20251111_053738433_02-300x206.png 300w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/figure>\n\n\n\n<p>\uc190\uc6b0\uc601 \ud559\uc0dd\uc740 MITRE ATT&amp;CK\uc744 \ud65c\uc6a9\ud55c \uc801\ub300\uc801 \ud589\uc704 \ub300\uc751\uc744 \uc704\ud55c GNN \uae30\ubc18 \uc608\uce21 \ubaa8\ub378\uc5d0 \ub300\ud574 \ubc1c\ud45c\ud558\uc600\uc73c\uba70, \ud574\ub2f9 \ub17c\ubb38\uc758 \uc815\ubcf4\ub294 \uc544\ub798\uc640 \uac19\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<p>Wooyoung Son, Soonhong Kwon, and Jong-Hyouk Lee, \u201cGNN-Based Predictive Model for Adversarial Cyber Behavior Using the MITRE ATT&amp;CK\u201d,\u00a0<em>IEEE Military Communications Conference 2025 (IEEE MILCOM 2025)<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2025\ub144 10\uc6d4 6\uc77c(\uc6d4)\ubd80\ud130 10(\uae08)\uae4c\uc9c0, \ubbf8\uad6d LA\uc5d0\uc11c IEEE MILCOM 2025\uac00 \uac1c\ucd5c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. MILCOM(Military Communications Conference)\uc740 \uad6d\ubc29 \ud1b5\uc2e0\uc758 \ub300\ud45c\uc801\uc778 \ud559\uc220\ub300\ud68c\uc774\uba70, PEL\uc5d0\uc11c\ub294 \uad8c\uc21c\ud64d \ud559\uc0dd\uacfc \uc190\uc6b0\uc601 \ud559\uc0dd\uc758 \ub17c\ubb38\uc774 \ubc1c\ud45c\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \uad8c\uc21c\ud64d \ud559\uc0dd\uc740 Temporal GNN\uc744 \ud65c\uc6a9\ud55c \ucee8\ud14c\uc774\ub108\ud654 \uc804\ub7b5 \uc2dc\uc2a4\ud15c\uc5d0\uc11c\uc758 \uc774\uc0c1 \ud0d0\uc9c0\uc5d0 \uad00\ud55c \ub17c\ubb38\uc744 \ubc1c\ud45c\ud558\uc600\uc73c\uba70, \ud574\ub2f9 \ub17c\ubb38\uc758 \uc815\ubcf4\ub294 \uc544\ub798\uc640 \uac19\uc2b5\ub2c8\ub2e4. Soonhong Kwon, Wooyoung Son, and Jong-Hyouk Lee, \u201cAnomaly Detection in Containerized Tactical Systems [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4180"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4180"}],"version-history":[{"count":1,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4180\/revisions"}],"predecessor-version":[{"id":4184,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/4180\/revisions\/4184"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}