• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detection ]" (97)
  1. 51. An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining
    Jiyoung Yun, Gun-Yoon Shin, Dong-Wook Kim, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 2, pp. 77-87, Apr. 2021
    10.7472/jksii.2021.22.2.77
    Keywords: Explainable AI, Log anomaly detection, Bayesian Probability, Rule Extraction
  2. 52. A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network
    JiHoon Yoo, Byeongjun Min, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 2, pp. 29-39, Apr. 2021
    10.7472/jksii.2021.22.2.29
    Keywords: NSL-KDD, Network intrusion detection, CNN, Discretization of Continuous
  3. 53. Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder
    Byeoungjun Min, Jihoon Yoo, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 1, pp. 13-22, Feb. 2021
    10.7472/jksii.2021.22.1.13
    Keywords: Anomaly Detection, Network intrusion detection, Autoencoder, NSL-KDD
  4. 54. Regeneration of a defective Railroad Surface for defect detection with Deep Convolution Neural Networks
  5. 55. A Feature-Based Malicious Executable Detection Approach Using Transfer Learning
    Yue Zhang, Hyun-HoYang, Ning Gao, Vol. 21, No. 5, pp. 57-65, Oct. 2020
    10.7472/jksii.2020.21.5.57
    Keywords: Malicious Executable Detection, Transfer Learning, Feature-Based
  6. 56. Design of Video Pre-processing Algorithm for High-speed Processing of Maritime Object Detection System and Deep Learning based Integrated System
  7. 57. Deep Learning-based Abnormal Behavior Detection System for Dementia Patients
    Kookjin Kim, Seungjin Lee, Sungjoong Kim, Jaegeun Kim, Dongil Shin, Dong-kyoo shin, Vol. 21, No. 3, pp. 133-144, Jun. 2020
    10.7472/jksii.2020.21.3.133
    Keywords: Abnomaly detection, deep-learning, Autoencoder, Long Short-Term Memory models
  8. 58. A study on evaluation method of NIDS datasets in closed military network
    Yong-bin Park, Sung-uk Shin, In-sup Lee, Vol. 21, No. 2, pp. 121-130, Apr. 2020
    10.7472/jksii.2020.21.2.121
    Keywords: dataset, Network intrusion detection system, Data evaluation, Machine Learning
  9. 59. Impact of the human body in wireless propagation of medical implants for tumor detection
  10. 60. A study on counting number of passengers by moving object detection
    Sang-Hyun Yoo, Vol. 21, No. 2, pp. 9-18, Apr. 2020
    10.7472/jksii.2020.21.2.9
    Keywords: Moving object detection, Object Contours Detection, Bus Passenger Counting