Digital Library
Search: "[ keyword: SI ]" (616)
-
591. Derivation of Digital Guide Routes : A Data-Driven Analysis of Hotspots for Older Adults in SeoulKyoung-mo Kang, Vol. 26, No. 4, pp. 125-134, Aug. 2025
10.7472/jksii.2025.26.4.125
Keywords: Digital Guide, Digital Divide, Digital Vulnerable, Older Adults Density, Indoor Education, Public Service Optimization -
Gwang-Hyun Ahn, Dong-kyoo Shin, Vol. 26, No. 4, pp. 161-177, Aug. 2025
10.7472/jksii.2025.26.4.161
Keywords: Cyber Resilience, MITRE D3FEND, risk management, Security Assessment -
Kwan-sun Hong, Jeong-ho Eom, Vol. 26, No. 3, pp. 145-152, Jun. 2025
10.7472/jksii.2025.26.3.145
Keywords: LLM, ProfieAgent, Korean War, Decision-Make -
Bo-yoon Choi, Byong-gul Lee, Vol. 26, No. 3, pp. 121-133, Jun. 2025
10.7472/jksii.2025.26.3.121
Keywords: Drone, safety assessment, Hazard analysis, Fault Tree Analysis (FTA), System-Theoretic Process Analysis (STPA) -
Da-in Choi, Moohong Min, Vol. 26, No. 3, pp. 99-109, Jun. 2025
10.7472/jksii.2025.26.3.99
Keywords: cybersecurity, Cybersecurity Workforce, Job Analysis, Unsupervised learning, topic modeling -
Younghwan Jeong, Taemin Hwang, Won-gi Choi, Jinyoung Lee, Seolyoung Park, Sangshin Lee, Vol. 26, No. 3, pp. 83-97, Jun. 2025
10.7472/jksii.2025.26.3.83
Keywords: Digital Twin, Federated learning, similarity search, object tracking, system optimization -
Soojung Lee, Vol. 26, No. 3, pp. 67-74, Jun. 2025
10.7472/jksii.2025.26.3.67
Keywords: Recommender System, Collaborative Filtering, Similarity Measure, data sparsity -
Hyunmin Lee, Kyungho Lee, Vol. 26, No. 3, pp. 19-33, Jun. 2025
10.7472/jksii.2025.26.3.19
Keywords: Attack trees, cybersecurity, data privacy, information security, Risk Analysis -
Sungjae Park, Sunghwan Cho, Yongchul Kim, InBok Lee, Sungjoon Ahn, Hyun Park, Vol. 26, No. 3, pp. 9-18, Jun. 2025
10.7472/jksii.2025.26.3.9
Keywords: Information Exchange Requirement, Data Distribution Capability, Link Transmission Rate -
Taesu Kim, Dongkyoo Shin, Dongil Shin, Vol. 26, No. 3, pp. 1-7, Jun. 2025
10.7472/jksii.2025.26.3.1
Keywords: Network intrusion detection, data augmentation




