• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ author: Yun ]" (485)
  1. 81. An Analysis of Big Video Data with Cloud Computing in Ubiquitous City
    Hak Geon Lee, Chang Ho Yun, Jong Won Park, Yong Woo Lee, Vol. 15, No. 3, pp. 45-52, Jun. 2014
    10.7472/jksii.2014.15.3.45
    Keywords: Ubiquitous City, U-City, Cloud computing, System Architectures, MapReduce, Hadoop
  2. 82. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  3. 83. NUI/NUX framework based on intuitive hand motion
    Gwanghyung Lee, Dongkyoo Shin, Dongil Shin, Vol. 15, No. 3, pp. 11-20, Jun. 2014
    10.7472/jksii.2014.15.3.11
    Keywords: NUI/NUX Framework, Hand Mouse, Kinect
  4. 84. A Study on the Interactions between the Actors of the 3D Broadcasting Standardization Process
    Kyung Hee Song, Kyu Tae Kwak, Soo Kyung Park, Bong Gyou Lee, Vol. 15, No. 2, pp. 109-128, Apr. 2014
    10.7472/jksii.2014.15.2.109
    Keywords: Standardization, Actor Network Theory, Socio-Technical Interpretation, 3D Broadcasting
  5. 85. An Analysis of Optimum Transmission Range in MANETs under various Propagation Models
    Hyungseok Choi, JaeYong Lee, ByungChul Kim, Vol. 15, No. 2, pp. 1-8, Apr. 2014
    10.7472/jksii.2014.15.2.01
    Keywords: Mobile Ad Hoc Network, MANET, connectivity, optimum transmission range, HATA propagation model
  6. 86. Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern
    Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
    10.7472/jksii.2014.15.1.157
    Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern
  7. 87. Propagation Models for Structural Parameters in Online Social Networks
    Jong-Hwan Kong, Ik Kyun Kim, Myung-Mook Han, Vol. 15, No. 1, pp. 125-134, Feb. 2014
    10.7472/jksii.2014.15.1.125
    Keywords: Malicious data, Propagation Model, Social Network, Internet Worm
  8. 88. The Effect of Online Community, Members, and Personal Characteristics on Lurking Behavior: Why do people only consume rather than create contents?
    Do-Hyung Park, Vol. 15, No. 1, pp. 73-88, Feb. 2014
    10.7472/jksii.2014.15.1.73
    Keywords: Online Community, Lurking Behavior, Social Network, Lurker
  9. 89. A Study on Distributed Processing of Big Data and User Authentication for Human-friendly Robot Service on Smartphone
  10. 90. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis