• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: TAC ]" (42)
  1. 21. A Classification Model for Attack Mail Detection based on the Authorship Analysis
    Sung-Sam Hong, Gun-Yoon Shin, Myung-Mook Han, Vol. 18, No. 6, pp. 35-46, Dec. 2017
    10.7472/jksii.2017.18.6.35
    Keywords: Text Mining, Machine Learning, Classification, Authorship Analysis, Attacker Identification
  2. 22. A Study on the Clustering method for Analysis of Zeus Botnet Attack Types in the Cloud Environment
    Won-il Bae, Suk-June Choi, Seong-Jin Kim, Hyeong-Cheon Kim, Jin Kwak, Vol. 18, No. 1, pp. 11-20, Feb. 2017
    10.7472/jksii.2017.18.1.11
    Keywords: Cloud computing, K-Means Clustering, Zeus botnet, Openstack
  3. 23. DDoS Attack Analysis Using the Improved ATMSim
    Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
    10.7472/jksii.2016.17.2.19
    Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack
  4. 24. The Real-Time Detection of the Malicious JavaScript
    Hyun-Lock Choo, Jong-Hun Jung, Hwan-Kuk Kim, Vol. 16, No. 4, pp. 51-60, Aug. 2015
    10.7472/jksii.2015.16.4.51
    Keywords: Malicious JavaScript, Analysis Engine, Static Analysis, Dynamic Analysis, Script-Based Cyber Attack
  5. 25. An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold
  6. 26. A Verifier-free Scheme for User Authentication and Access Control Using Smart Cards: Improvement of Chen-Yeh's Method
    Yong Kim, Min Gyo Chung, Vol. 14, No. 4, pp. 43-52, Aug. 2013
    10.7472/jksii.2013.14.4.43
    Keywords: User Authentication, access control, smart card, SVA(stolen verifier attack)
  7. 27. A Study on the Automatic Monitoring System for the Contact Center Using Emotion Recognition and Keyword Spotting Method
    Won-Jung Yoon, Tae-Hong Kim, Kyu-Sik Park, Vol. 13, No. 3, pp. 107-114, Jun. 2012
    10.7472/jksii.2012.13.3.107
    Keywords: Emotion Recognition, Keyword Spotting, Contact Center, Automatic Monitoring System
  8. 28. Attack Detection in Recommender Systems Using a Rating Stream Trend Analysis
    Yong-Uk Kim, Jun-Tae Kim, Vol. 12, No. 2, pp. 85-102, Apr. 2011
    Keywords: Recommendation System, Recommendation Attack, data stream
  9. 29. Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data
    Hyung-Woo Lee, Vol. 11, No. 6, pp. 73-86, Dec. 2010
    Keywords: Integrated Event Log, Web Attack Detection, internet security
  10. 30. A Smart Mobile Mail System Based on MPEG21-DIDL for Any Mobile Device
    Mei-Hua Zhao, Chang-Wo Seo, Young-Hwan Lim, Vol. 11, No. 3, pp. 1-14, Jun. 2010
    Keywords: Mobile Mail, Mobile Device, DIDL, Attached file