• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detect ]" (114)
  1. 31. CNN-based Shadow Detection Method using Height map in 3D Virtual City Model
    Hee Jin Yoon, Ju Wan Kim, In Sung Jang, Byung-Dai Lee, Nam-Gi Kim, Vol. 20, No. 6, pp. 55-63, Dec. 2019
    10.7472/jksii.2019.20.6.55
    Keywords: shadow detection, deep-learning
  2. 32. An Efficient BotNet Detection Scheme Exploiting Word2Vec and Accelerated Hierarchical Density-based Clustering
    Taeil Lee, Kwanhyun Kim, Jihyun Lee, Suchul Lee, Vol. 20, No. 6, pp. 11-20, Dec. 2019
    10.7472/jksii.2019.20.6.11
    Keywords: Botnet Detection, Word2vec, clustering, Skip-gram
  3. 33. Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer
    Hyung-Woo Lee, Hanseong Lee, Vol. 20, No. 5, pp. 9-18, Oct. 2019
    10.7472/jksii.2019.20.5.9
    Keywords: Android Mobile APK, Detection DApp, Forgery Detection, Blockchain, Hyperledger Composer
  4. 34. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning
  5. 35. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  6. 36. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  7. 37. Event Detection System Using Twitter Data
    Tae Soo Park, Ok-Ran Jeong, Vol. 17, No. 6, pp. 153-0, Dec. 2016
    10.7472/jksii.2016.17.6.153
    Keywords: Event Detection, Social Network, Social Media Contents
  8. 38. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  9. 39. BoF based Action Recognition using Spatio-Temporal 2D Descriptor
    JinOk KIM, Vol. 16, No. 3, pp. 21-32, Jun. 2015
    10.7472/jksii.2015.16.3.21
    Keywords: Action Recognition, BoF(Bag of Features), Spatio-temporal Action Detector, Feature Descriptor
  10. 40. An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold