• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: similarity ]" (15)
  1. 1. Cyber attack group classification based on MITRE ATT&CK model
    Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
    10.7472/jksii.2022.23.6.1
    Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK
  2. 2. Information-Sharing Patterns of A Directed Social Network: The Case of Imhonet
  3. 3. Collaborative Filtering using Co-Occurrence and Similarity information
    Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
    10.7472/jksii.2017.18.3.19
    Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model
  4. 4. Representative Labels Selection Technique for Document Cluster using WordNet
    Tae-Hoon Kim, Mye Sohn, Vol. 18, No. 2, pp. 61-74, Apr. 2017
    10.7472/jksii.2017.18.2.61
    Keywords: Documents Cluster Labeling, Information content, WordNet, Similarity Calculation
  5. 5. DDoS Attack Analysis Using the Improved ATMSim
    Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
    10.7472/jksii.2016.17.2.19
    Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack
  6. 6. A Proposal of Methods for Extracting Temporal Information of History-related Web Document based on Historical Objects Using Machine Learning Techniques
  7. 7. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  8. 8. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  9. 9. A Semantic-Based Mashup Development Tool Supporting Various Open API Types
    Yong-Ju Lee, Vol. 13, No. 3, pp. 115-126, Jun. 2012
    10.7472/jksii.2012.13.3.115
    Keywords: mashup, Open API, semantic ontology, interactive mashup composition system, similarity search, API composition
  10. 10. Customized Knowledge Creation Framework using Context- and intensity-based Similarity