• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: LLM ]" (10)
  1. 1. Fiterview: Development and Evaluation of an AI-Based Personalized Mock Interview Service
  2. 2. An Empirical Study on Ethicality Evaluation of LLM Response
    Jun Sang Jo, Shin Namgung, Won Sang Lee, Vol. 27, No. 1, pp. 213-220, Feb. 2026
    10.7472/jksii.2026.27.1.213
    Keywords: LLM, AI ethics, trolley dilemma, Logistic Regression
  3. 3. sLLM-Based Multi-Agent Situation-Aware Decision-Making System for Mission-Oriented Task Planning in MUM-T Operations
    Hye-rim Han, Jong-geun Choi, Vol. 26, No. 4, pp. 89-97, Aug. 2025
    10.7472/jksii.2025.26.4.89
    Keywords: MUM-T, Multi-agent, Command & Control System, Decision-Making system, UAV, GCS, sLLM
  4. 4. Time Series Forecasting Using RAG-based News Information and Large Language Models: A Case Study on COVID-19 Data
  5. 5. LLM-Based Cyber Threat Analysis Report: Automated Attack Technique Analysis Technology
    Yonghyeon Park, Changhee Choi, Vol. 26, No. 4, pp. 9-18, Aug. 2025
    10.7472/jksii.2025.26.4.9
    Keywords: LLM, finetuning, MITRE ATT&CK, cyber attack technique
  6. 6. Reconstructing and Predicting Historical War Decisions Using ProfileAgent Reflecting Human Irrationality: A Case Study of the Korean War
    Kwan-sun Hong, Jeong-ho Eom, Vol. 26, No. 3, pp. 145-152, Jun. 2025
    10.7472/jksii.2025.26.3.145
    Keywords: LLM, ProfieAgent, Korean War, Decision-Make
  7. 7. Research on the Security Intelligence & Regulation Enforcement Network(SIREN) Model with RAG
    JaeHwan Kwon, JuHo Bai, Gwang-Yong Gim, Vol. 26, No. 3, pp. 135-144, Jun. 2025
    10.7472/jksii.2025.26.3.135
    Keywords: Retrieval Augmented Generation(RAG), Large Language Model(LLM) Agent, Security Guide, Security Intelligence
  8. 8. Recent Trends on Generative AI in National Defense
    Simun Yuk, Youngho Cho, Vol. 26, No. 1, pp. 203-209, Feb. 2025
    10.7472/jksii.2025.26.1.203
    Keywords: Generative AI in National defense, Generative Defense AI, LLM, sLLM, ChatGPT
  9. 9. Study on Elliptic Curve Diffie-Hellman based Verification Token Authentication Implementation
    Cheong H. Choi, Vol. 19, No. 5, pp. 55-66, Oct. 2018
    10.7472/jksii.2018.19.5.55
    Keywords: authentication, Diffie-Hellman, Elliptic Curve Crypto
  10. 10. An Enhancement of Simple Authenticated Key Agreement Protocol