Digital Library
Search: "[ keyword: SI ]" (601)
-
Taesu Kim, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 3, pp. 1-7, Jun. 2025
10.7472/jksii.2025.26.3.1
Keywords: Network intrusion detection, data augmentation -
Sungjae Park, Sunghwan Cho, Yongchul Kim, InBok Lee, Sungjoon Ahn, Hyun Park, Vol. 26, No. 3, pp. 9-18, Jun. 2025
10.7472/jksii.2025.26.3.9
Keywords: Information Exchange Requirement, Data Distribution Capability, Link Transmission Rate -
Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
10.7472/jksii.2025.26.3.19
Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis -
Soojung Lee, Vol. 26, No. 3, pp. 67-74, Jun. 2025
10.7472/jksii.2025.26.3.67
Keywords: Recommender System, Collaborative Filtering, Similarity Measure, data sparsity -
Younghwan Jeong, Taemin Hwang, Won-gi Choi, Jinyoung Lee, Seolyoung Park, Sangshin Lee, Vol. 26, No. 3, pp. 83-97, Jun. 2025
10.7472/jksii.2025.26.3.83
Keywords: Digital Twin, Federated learning, similarity search, object tracking, system optimization -
Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
10.7472/jksii.2025.26.3.99
Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling -
Bo-yoon Choi, Byong-gul Lee, Vol. 26, No. 3, pp. 121-133, Jun. 2025
10.7472/jksii.2025.26.3.121
Keywords: Drone, safety assessment, Hazard analysis, Fault Tree Analysis (FTA), System-Theoretic Process Analysis (STPA) -
Kwan-sun Hong, Jeong-ho Eom, Vol. 26, No. 3, pp. 145-152, Jun. 2025
10.7472/jksii.2025.26.3.145
Keywords: LLM, ProfieAgent, Korean War, Decision-Make -
WonJun Choi, JeSeol Yu, Vol. 26, No. 2, pp. 51-60, Apr. 2025
10.7472/jksii.2025.26.2.51
Keywords: forensic, scientific ciriminal investigation, activity level, Fingerprint, Deep Learning -
Sang-Jae Yeo, Zoo-Ho Son, Jee-Yeon Jeon, Hyung-Taek Kim, Vol. 26, No. 2, pp. 43-50, Apr. 2025
10.7472/jksii.2025.26.2.43
Keywords: Anomaly Detection, Machine Learning, Current signal, Induction motor, Statistical distance