• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 탐지 ]" (58)
  1. 11. An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering
    Taeil Lee, Kwanhyun Kim, Jihyun Lee, Suchul Lee, Vol. 20, No. 6, pp. 11-20, Dec. 2019
    10.7472/jksii.2019.20.6.11
    Keywords: Botnet Detection, Word2vec, clustering, Skip-gram
  2. 12. A Study on the Pipe Position Estimation in GPR Images Using Deep Learning Based Convolutional Neural Network
    Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
    10.7472/jksii.2019.20.4.39
    Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning
  3. 13. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  4. 14. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning
  5. 15. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  6. 16. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  7. 17. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  8. 18. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  9. 19. An Illegally-copied App Detecting Method by Using Odex File in Android Platform
    Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
    10.7472/jksii.2015.16.2.67
    Keywords: illegally-copied app, detector, android platform, execution hiding, odex file
  10. 20. An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold