• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CIO ]" (11)
  1. 1. A Feature-Based Malicious Executable Detection Approach Using Transfer Learning
    Yue Zhang, Hyun-HoYang, Ning Gao, Vol. 21, No. 5, pp. 57-65, Oct. 2020
    10.7472/jksii.2020.21.5.57
    Keywords: Malicious Executable Detection, Transfer Learning, Feature-Based
  2. 2. Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain
    Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
    10.7472/jksii.2019.20.2.61
    Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection.
  3. 3. The Real-Time Detection of the Malicious JavaScript
    Hyun-Lock Choo, Jong-Hun Jung, Hwan-Kuk Kim, Vol. 16, No. 4, pp. 51-60, Aug. 2015
    10.7472/jksii.2015.16.4.51
    Keywords: Malicious JavaScript, Analysis Engine, Static Analysis, Dynamic Analysis, Script-Based Cyber Attack
  4. 4. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  5. 5. A Study on the Interactions between the Actors of the 3D Broadcasting Standardization Process
    Kyung Hee Song, Kyu Tae Kwak, Soo Kyung Park, Bong Gyou Lee, Vol. 15, No. 2, pp. 109-128, Apr. 2014
    10.7472/jksii.2014.15.2.109
    Keywords: Standardization, Actor Network Theory, Socio-Technical Interpretation, 3D Broadcasting
  6. 6. Propagation Models for Structural Parameters in Online Social Networks
    Jong-Hwan Kong, Ik Kyun Kim, Myung-Mook Han, Vol. 15, No. 1, pp. 125-134, Feb. 2014
    10.7472/jksii.2014.15.1.125
    Keywords: Malicious data, Propagation Model, Social Network, Internet Worm
  7. 7. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  8. 8. Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
    10.7472/jksii.2013.14.3.35
    Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection
  9. 9. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  10. 10. Investigating the Adoption of IPTV Services Influenced by Socio-cultural Factor, Flow Experience and Perceived Behavioral Control