Digital Library
Search: "[ keyword: App ]" (81)
-
Sung-Ho Cho, Min-Goo Kang, Vol. 3, No. 6, pp. 79-0, Dec. 2002
Keywords: re-ordering schemes, CBI, BTS, TSH, Broadcast Invalidation Approach, Certification Protocol -
Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
10.7472/jksii.2014.15.4.135
Keywords: Mobile Application, Development Process Model, Design Method with Diagram -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis -
Young-Kwan Choi, Eung-Kwon Kim, Vol. 14, No. 4, pp. 85-90, Aug. 2013
10.7472/jksii.2013.14.4.85
Keywords: Electric Fire Prediction System, arc detection, DSP(Digital Signal Processor), Smart phone App -
Young-Chae Kim, Seung Ryul Jeong, Vol. 14, No. 4, pp. 73-84, Aug. 2013
10.7472/jksii.2013.14.4.73
Keywords: Mobile App, Flow Experience, Flow Theory, Technology Acceptance, Usage -
Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
10.7472/jksii.2013.14.4.35
Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
10.7472/jksii.2013.14.3.35
Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection -
Gwangbum Pyun, Unil Yun, Vol. 14, No. 1, pp. 63-0, Feb. 2013
10.7472/jksii.2013.14.63
Keywords: approximate frequent pattern mining, Chernoff technique, probabilistic technique, Performance Evaluation, scalability -
Sung-Wook Baek, Hyo-Young Ahn, Zoon-Ky Lee, Vol. 13, No. 4, pp. 103-0, Aug. 2012
10.7472/jksii.2012.13.4.103
Keywords: Appstore, Moblie Application Market, App, Information Searching Process