• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 탐지 ]" (48)
  1. 31. A Study on the Pipe Position Estimation in GPR Images Using Deep Learning Based Convolutional Neural Network
    Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
    10.7472/jksii.2019.20.4.39
    Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning
  2. 32. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  3. 33. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning
  4. 34. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  5. 35. A Robust Object Detection and Tracking Method using RGB-D Model
    Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
    10.7472/jksii.2017.18.4.61
    Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation
  6. 36. A Detection Model using Labeling based on Inference and Unsupervised Learning Method
  7. 37. A Rogue AP Detection Method Based on DHCP Snooping
    Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
    10.7472/jksii.2016.17.3.11
    Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping
  8. 38. An Illegally-copied App Detecting Method by Using Odex File in Android Platform
    Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
    10.7472/jksii.2015.16.2.67
    Keywords: illegally-copied app, detector, android platform, execution hiding, odex file
  9. 39. An Inference Method of Stateless Firewall Policy Considering Attack Detection Threshold
  10. 40. Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern
    Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
    10.7472/jksii.2014.15.1.157
    Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern