• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: application" (32)
  1. 1. Design and Implementation of Luo-kuan Recognition Application
    Han-Syel Kim, Kwi-Bin Seo, Mingoo Kang, Gee Soo Ryu, Min Hong, Vol. 19, No. 1, pp. 97-103, Feb. 2018
    10.7472/jksii.2018.19.1.97
    Keywords: Luo-kuan(落款), Mobile Application, image processing
  2. 2. Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform
  3. 3. Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device
    Jong-ho Bang, Song-Yeon Lee, Jong-Ho Paik, Vol. 19, No. 1, pp. 19-26, Feb. 2018
    10.7472/jksii.2018.19.1.19
    Keywords: Sensor device, Bluetooth, Protocol, Internet of Thing, Smartphone application
  4. 4. Development of Customized Trip Navigation System Using Open Government Data
    Beomsoo Shim, Hanjun Lee, Donghee Yoo, Vol. 17, No. 1, pp. 15-22, Feb. 2016
    10.7472/jksii.2016.17.1.15
    Keywords: open government data, Big data, application, Recommendation System, case-based reasoning(CBR), Data Mining
  5. 5. An Efficient On-line Software Service based on Application Customized Graphic Offloading Library
    WonHyuk Choi, Won-Young Kim, Vol. 16, No. 5, pp. 49-58, Oct. 2015
    10.7472/jksii.2015.16.5.49
    Keywords: Graphic Offloading, Application Customized library, Software service
  6. 6. Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network
    Jinsuk Kim, Yongtae Shin, Vol. 16, No. 2, pp. 19-26, Apr. 2015
    10.7472/jksii.2015.16.2.19
    Keywords: EPC, Capturing Application, Middleware, RFID, Trace
  7. 7. A Software Development Process for Mobile Applications
    Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
    10.7472/jksii.2014.15.4.135
    Keywords: Mobile Application, Development Process Model, Design Method with Diagram
  8. 8. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  9. 9. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  10. 10. An Object-Oriented Analysis and Design Methodology for Security of Web Applications
    Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
    10.7472/jksii.2013.14.4.35
    Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE