Digital Library
Search: "[ keyword: 탐지 ]" (55)
-
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
10.7472/jksii.2013.14.3.35
Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection -
Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
10.7472/jksii.2013.14.2.61
Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process -
Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
10.7472/jksii.2012.13.2.41
Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM -
Byung-Mun Lee, Hyun-Ho Shin, Un-Gu Kang, Vol. 12, No. 6, pp. 73-82, Dec. 2011
Keywords: Location-based service, Tracking system -
Moon-Sun Shin, Woo-Jin Paik, Vol. 10, No. 2, pp. 1-14, Apr. 2009
Keywords: alert data, IDS, sequential pattern mining, prefixSpan -
Jae-Young Chang, Jong-Myoung Park, Han-Joon Kim, Vol. 8, No. 6, pp. 43-54, Dec. 2007
Keywords: network intrusion system, outlier detection algorithm, density function -
Young-nam Song, Seung-gyu Kim, Tae-Ho Im, Vol. 26, No. 5, pp. 29-38, Oct. 2025
10.7472/jksii.2025.26.5.29
Keywords: Life-jacket Detection, YOLO11n, Dual Detection Method, Marine Safety, small-object detection -
Hyunjun Park, Insup Lee, Vol. 26, No. 4, pp. 1-8, Aug. 2025
10.7472/jksii.2025.26.4.1
Keywords: ddos detection, Deep Learning, Transfer Learning, traffic volume-based labeling




