• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (52)
  1. 11. A Study on the Automatic Monitoring System for the Contact Center Using Emotion Recognition and Keyword Spotting Method
    Won-Jung Yoon, Tae-Hong Kim, Kyu-Sik Park, Vol. 13, No. 3, pp. 107-114, Jun. 2012
    10.7472/jksii.2012.13.3.107
    Keywords: Emotion Recognition, Keyword Spotting, Contact Center, Automatic Monitoring System
  2. 12. Attack Detection in Recommender Systems Using a Rating Stream Trend Analysis
    Yong-Uk Kim, Jun-Tae Kim, Vol. 12, No. 2, pp. 85-102, Apr. 2011
    Keywords: Recommendation System, Recommendation Attack, data stream
  3. 13. Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data
    Hyung-Woo Lee, Vol. 11, No. 6, pp. 73-86, Dec. 2010
    Keywords: Integrated Event Log, Web Attack Detection, internet security
  4. 14. A Smart Mobile Mail System Based on MPEG21-DIDL for Any Mobile Device
    Mei-Hua Zhao, Chang-Wo Seo, Young-Hwan Lim, Vol. 11, No. 3, pp. 1-14, Jun. 2010
    Keywords: Mobile Mail, Mobile Device, DIDL, Attached file
  5. 15. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  6. 16. Web Service Matching Algorithm using Cluster and Ontology Information
    Yong-Ju Lee, Vol. 11, No. 1, pp. 59-70, Feb. 2010
    Keywords: Web Service, matching algorithm, keyword search, syntactic analysis, cluster, Ontology
  7. 17. A Robust Collaborative Filtering against Manipulated Ratings
  8. 18. Extracting Fuzzy Rules for Classifying Ventricular Tachycardia/Ventricular Fibrillation Based on NEWFM
  9. 19. Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme
  10. 20. Response Methodology against Spoofed IP Attack using Active Networks Mechanism