• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Trace ]" (10)
  1. 1. Visualization models for tracking software requirements and managing their changes
    YooRi Song, Hyeon Soo Kim, Vol. 22, No. 3, pp. 59-66, Jun. 2021
    10.7472/jksii.2021.22.3.59
    Keywords: Software Requirement, Traceability, Software Change Management, Visualization Model
  2. 2. Enhancing Model-based Fault Traceability by Using Similarity between Bug and Commit Information
    Dongju Jung, Kyeongsic Min, Jung-Won Lee, Byungjeong Lee, Vol. 20, No. 2, pp. 29-37, Apr. 2019
    10.7472/jksii.2019.20.2.29
    Keywords: Fault traceability, Bug Report, Commit Information
  3. 3. The Analysis of User Perception and Attitude Using SNS Data about Emergency Contraceptive Pills
    Sung Hyun Lee, Vol. 18, No. 1, pp. 143-152, Feb. 2017
    10.7472/jksii.2017.18.1.143
    Keywords: Healthcare, Big data, Text Mining, Data Mining, Emergency Contraceptive
  4. 4. A memory protection method for application programs on the Android operating system
  5. 5. Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network
    Jinsuk Kim, Yongtae Shin, Vol. 16, No. 2, pp. 19-26, Apr. 2015
    10.7472/jksii.2015.16.2.19
    Keywords: EPC, Capturing Application, Middleware, RFID, Trace
  6. 6. An automatic detection scheme of anti-debugging routines to the environment for analysis
    Jin-Woo Park, Yong-Su Park, Vol. 15, No. 6, pp. 47-54, Dec. 2014
    10.7472/jksii.2014.15.6.47
    Keywords: Anti-debugging, Malware, Instruction trace, API trace, Anti-reversing, Anti-reverse Engineering
  7. 7. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  8. 8. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security
  9. 9. The intruder traceback mechanism based on active networks
    Lee Young-seok, Vol. 6, No. 1, pp. 1-12, Feb. 2005
    Keywords: DoS, DDoS, Active network, Traceback mechanism
  10. 10. Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack
    Lee Hyung-Woo, Vol. 5, No. 1, pp. 85-98, Feb. 2004
    Keywords: DDoS, Traceback, ICMP, ACC, Pushback