• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CTI ]" (386)
  1. 241. Feature-selection algorithm based on genetic algorithms using unstructured data for attack mail identification
    Sung-Sam Hong, Dong-Wook Kim, Myung-Mook Han, Vol. 20, No. 1, pp. 1-10, Feb. 2019
    10.7472/jksii.2019.20.1.01
    Keywords: Security, Unstructured Data, Intelligent Data Analysis, Feature selection, Attack Mail
  2. 242. A Longitudinal Study on Customers’ Usable Features and Needs of Activity Trackers as IoT based Devices
  3. 243. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  4. 244. A Study on US Consumer’s Subjectivity Schemata of Sharing Economy: Q Methodology
    Ki-youn Kim, Vol. 19, No. 4, pp. 107-121, Aug. 2018
    10.7472/jksii.2018.19.4.107
    Keywords: Sharing Economy, Subjectivity, Schemata, Q Methodology, Consumer Behavior, segmentation
  5. 245. Millennial Generation’s Mobile News Consumption and the Impact of Social Media
    Jinah Seol, Vol. 19, No. 4, pp. 123-133, Aug. 2018
    10.7472/jksii.2018.19.4.123
    Keywords: Millennial Generation, Mobile News, SNS, News Topics, News values, Reaction
  6. 246. Performance Enhancement of Algorithms based on Error Distributions under Impulsive Noise
    Namyong Kim, Gyoo-yeong Lee, Vol. 19, No. 3, pp. 49-56, Jun. 2018
    10.7472/jksii.2018.19.3.49
    Keywords: components, Error distribution, delta function, Euclidean Distance, Impulsive noise.
  7. 247. Examining the relationship between educational effectiveness and computational thinking in smart learning environment
    Oakyoung Han, Jaehyoun Kim, Vol. 19, No. 2, pp. 57-67, Apr. 2018
    10.7472/jksii.2018.19.2.57
    Keywords: Smart Learning Environment, Computational Thinking, Educational Effectiveness, Factor Analysis
  8. 248. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  9. 249. Performance Analysis of Fractional Frequency Reuse Scheme for Enterprise Femtocell Networks
    Se-Jin Kim, Vol. 19, No. 1, pp. 11-17, Feb. 2018
    10.7472/jksii.2018.19.1.11
    Keywords: Femtocell networks, Enterprise, Fractional frequency reuse, resource management
  10. 250. Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform