• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 탐지 ]" (54)
  1. 21. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  2. 22. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    10.7472/jksii.2012.13.2.41
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM
  3. 23. Efficient Tracking System for Passengers with the Detection Algorithm of a Stopping Vehicle
    Byung-Mun Lee, Hyun-Ho Shin, Un-Gu Kang, Vol. 12, No. 6, pp. 73-82, Dec. 2011
    Keywords: Location-based service, Tracking system
  4. 24. Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern
    Moon-Sun Shin, Woo-Jin Paik, Vol. 10, No. 2, pp. 1-14, Apr. 2009
    Keywords: alert data, IDS, sequential pattern mining, prefixSpan
  5. 25. Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism
    Hyung-Woo Lee, Vol. 9, No. 6, pp. 37-48, Dec. 2008
    Keywords: SIP, VoIP
  6. 26. MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network
    Je-Gyeong Jo, Hyung-Woo Lee, Vol. 9, No. 4, pp. 85-96, Aug. 2008
    Keywords: SIP, VoIP
  7. 27. An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems
  8. 28. Enhanced DDoS Detection via Traffic Volume-based Labeling and Transfer learning
    Hyunjun Park, Insup Lee, Vol. 26, No. 4, pp. 1-8, Aug. 2025
    10.7472/jksii.2025.26.4.1
    Keywords: ddos detection, Deep Learning, Transfer Learning, traffic volume-based labeling
  9. 29. A Study on Data Augmentation Methods for Improving the Performance of Machine Learning Models in Network Attack Detection
    Taesu Kim, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 3, pp. 1-7, Jun. 2025
    10.7472/jksii.2025.26.3.1
    Keywords: Network intrusion detection, data augmentation
  10. 30. A Study on the Detection of Abnormal Behavior of Weapon System Circuit using Electromagnetic Wave Signal Analysis
    Janghyuk Kauh, Changmin Jeong, Koohyung Kwon, Vol. 26, No. 1, pp. 221-233, Feb. 2025
    10.7472/jksii.2025.26.1.221
    Keywords: Hardware Trojan, Anomaly Detection, Electromagnetic Analysis, Side channel analysis, FPGA, ASIC