• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: App ]" (81)
  1. 21. A Certification Protocol based on Broadcast Invalidation Approach
  2. 22. A Software Development Process for Mobile Applications
    Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
    10.7472/jksii.2014.15.4.135
    Keywords: Mobile Application, Development Process Model, Design Method with Diagram
  3. 23. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  4. 24. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  5. 25. A Study on Development of App-Based Electric Fire Prediction System
    Young-Kwan Choi, Eung-Kwon Kim, Vol. 14, No. 4, pp. 85-90, Aug. 2013
    10.7472/jksii.2013.14.4.85
    Keywords: Electric Fire Prediction System, arc detection, DSP(Digital Signal Processor), Smart phone App
  6. 26. A study on Factors that Influence the Usage of Mobile Apps - Based on Flow Theory and Unified Theory of Acceptance and Use of Technology -
    Young-Chae Kim, Seung Ryul Jeong, Vol. 14, No. 4, pp. 73-84, Aug. 2013
    10.7472/jksii.2013.14.4.73
    Keywords: Mobile App, Flow Experience, Flow Theory, Technology Acceptance, Usage
  7. 27. An Object-Oriented Analysis and Design Methodology for Security of Web Applications
    Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
    10.7472/jksii.2013.14.4.35
    Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE
  8. 28. Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
    10.7472/jksii.2013.14.3.35
    Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection
  9. 29. Performance evaluation of approximate frequent pattern mining based on probabilistic technique
  10. 30. Study on the Performance of Information Search Process in term of Attributes of Apps in Appstore and Buyer's Innovativeness
    Sung-Wook Baek, Hyo-Young Ahn, Zoon-Ky Lee, Vol. 13, No. 4, pp. 103-0, Aug. 2012
    10.7472/jksii.2012.13.4.103
    Keywords: Appstore, Moblie Application Market, App, Information Searching Process