• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)

Hot Downloaded Papers


  1. 1. Alternatives for New Internet Interconnection Policy
  2. 2. Layered Authoring of Cyber Warfare Training Scenario
  3. 3. Knowledge Graph-based Korean New Words Detection Mechanism for Spam Filtering
  4. 4. A Sketch-based 3D Object Retrieval Approach for Augmented Reality Models Using Deep Learning
  5. 5. Dessert Ateliers Recommendation Methods for Dessert E-commerce Services
    Yeonbin Son, Tai-Woo Chang, Yerim Choi, Vol. 21, No. 1, pp. 111-117, Feb. 2020
    Keywords: , dessert atelier, dessert e-commerce, dessert atelier recommendation, clustering, dynamic weighting
  6. 6. Unstructured Data Analysis using Equipment Check Ledger: A Case Study in Telecom Domain
  7. 7. Adaptive Consensus Bound PBFT Algorithm Design for Eliminating Interface Factors of Blockchain Consensus
  8. 8. Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric
  9. 9. Analyzing Patterns of Sales and Floating Population Using Markov Chain
  10. 10. A Methodology of Decision Making Condition-based Data Modeling for Constructing AI Staff
  11. 11. A Study on the Industrial Revitalization through the Performance Analysis of the Korean Government's Cloud Policy in Service Consumer’s Perspective
    Moon Jeung Joe, Vol. 21, No. 1, pp. 159-167, Feb. 2020
    Keywords: 클라우드, IT 전략, Cloud, IT Strategy
  12. 12. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
  13. 13. Analysis of Job Happiness Types of SW Development Personnel Using Q-sort Methodology
  14. 14. A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM)
  15. 15. Research on text mining based malware analysis technology using string information
  16. 16. The Effects of Self-Consciousness and News Consumption on Facebook
    Mina Lee, Seungchan Yang, Vol. 21, No. 1, pp. 87-93, Feb. 2020
    Keywords: , Facebook usage, news consumption on Facebook, private SC, public SC
  17. 17. The Study on analysis methodology of optimal performance and quantity for Mission-Based drones
    Young-Seok Ha, Vol. 21, No. 1, pp. 231-236, Feb. 2020
    Keywords: 드론, 소요량, 모의분석, 적정 소요량, Drone, Quantity of demand, Simulation analysis, Appropriate Quantity
  18. 18. A study on the Application of Effects-based Operation in Cyberspace
  19. 19. A study on counting number of passengers by moving object detection
  20. 20. Interface Development for Pre and Post processor on EDISON Platform Simulation System
  21. 21. Drone Force Deployment Optimization Algorithm For Efficient Military Drone Operations
  22. 22. A Study on the Anomaly Prediction System of Drone Using Big Data
    Yang-Kyoo Lee, Jun-Ki Hong, Sung-Chan Hong, Vol. 21, No. 2, pp. 27-37, Apr. 2020
    Keywords: 빅데이터, 드론, 위험예측, Big data, Drones, Risk Prediction
  23. 23. The Effects of Online Uncivil Comments on Vicarious shame and Coping Strategies: Focusing on the Power of Social Identity and Social Recommendation
    Jiwon Kim, Vol. 21, No. 1, pp. 119-125, Feb. 2020
    Keywords: , Online Comment, Incivility, Social Recommendation, Shame, Coping Strategies
  24. 24. A Study on the Development Strategy of VR Game Content by Group Based on Conjoint Analysis
  25. 25. CFI Approach to Defend against GOT Overwrite Attacks
  26. 26. An Exploratory Study on the 2018 North Korea-U.S. Summit News and Singapore’s Place Branding
    Jinah Seol, Vol. 21, No. 1, pp. 147-157, Feb. 2020
    Keywords: , North Korea-US Summit, ‘Trump-Kim’ Summit, Singapore, Place Branding
  27. 27. Impact of the human body in wireless propagation of medical implants for tumor detection
  28. 28. The study of Defense Artificial Intelligence and Block-chain Convergence
    Seyong Kim, Hyukjin Kwon, Minwoo Choi, Vol. 21, No. 2, pp. 81-90, Apr. 2020
    Keywords: 인공지능, 블록체인, 해쉬함수, 빅데이터, AI, Block-chain, Hash Function, Big-Data
  29. 29. A Study on the Operation Concept of Cyber Warfare Execution Procedures
  30. 30. A Study on Battle Damage Assessment of Electronic Warfare associated with Cyber Warfare