• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: App ]" (78)
  1. 11. Design and Analysis of Educational Java Applets for Learning Simplification Procedure Using Karnaugh Map
  2. 12. An Illegally-copied App Detecting Method by Using Odex File in Android Platform
    Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
    10.7472/jksii.2015.16.2.67
    Keywords: illegally-copied app, detector, android platform, execution hiding, odex file
  3. 13. Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network
    Jinsuk Kim, Yongtae Shin, Vol. 16, No. 2, pp. 19-26, Apr. 2015
    10.7472/jksii.2015.16.2.19
    Keywords: EPC, Capturing Application, Middleware, RFID, Trace
  4. 14. Factors of Leading the Adoption of Diet/Exercise Apps on Smartphones: Application of Channel Expansion Theory
  5. 15. The secured mobile wallet system using by integrated ID
    Choon-Sung Nam, Min-Kyung Jeon, Dong-Ryeol Shin, Vol. 16, No. 1, pp. 9-20, Feb. 2015
    10.7472/jksii.2015.16.1.09
    Keywords: Smart Wallet, Payment System, Integrated ID, Single Tapping
  6. 16. A Software Development Process for Mobile Applications
    Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
    10.7472/jksii.2014.15.4.135
    Keywords: Mobile Application, Development Process Model, Design Method with Diagram
  7. 17. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  8. 18. A Study on Smart card-based Security Mechanisms of upgrades Smart Meter SW for secure deployment in Smart Grid
    Inseok Yang, Seokhie Hong, Vol. 15, No. 2, pp. 129-142, Apr. 2014
    10.7472/jksii.2014.15.2.129
    Keywords: SW Update of Smart meter, security of smart meter, smart card, Type approval, PKI for Legal Metrology instrument
  9. 19. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  10. 20. A Study on Development of App-Based Electric Fire Prediction System
    Young-Kwan Choi, Eung-Kwon Kim, Vol. 14, No. 4, pp. 85-90, Aug. 2013
    10.7472/jksii.2013.14.4.85
    Keywords: Electric Fire Prediction System, arc detection, DSP(Digital Signal Processor), Smart phone App