Digital Library
Search: "[ keyword: 탐지 ]" (48)
-
Jihun Chae, Hyoung-yong Ko, Byoung-gil Lee, Namgi Kim, Vol. 20, No. 4, pp. 39-46, Aug. 2019
10.7472/jksii.2019.20.4.39
Keywords: sink holes, pipe, GPR, Image recognition, underground detection, CNN, deep-learning -
Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
10.7472/jksii.2019.20.2.9
Keywords: Malware, Detection rule, SNORT, LDA, network threat -
Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
10.7472/jksii.2018.19.6.41
Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning -
Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
10.7472/jksii.2018.19.5.67
Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN -
Park, Seohee;Chun, Junchul;, Vol. 18, No. 4, pp. 61-68, Aug. 2017
10.7472/jksii.2017.18.4.61
Keywords: 3D CCTV, video surveillance, Object Detection, object tracking, Depth Map, Image Segmentation -
Sung-Sam Hong, Dong-Wook Kim, Byungik Kim, Myung-Mook Han, Vol. 18, No. 1, pp. 65-76, Feb. 2017
10.7472/jksii.2017.18.1.65
Keywords: Labeling, Detection Model based on classification, Data Mining, Inference, Supervised/Unsupervised Learning, Security -
Seungchul Park, Vol. 17, No. 3, pp. 11-18, Jun. 2016
10.7472/jksii.2016.17.3.11
Keywords: WiFi security, rogue AP, rogue AP detection, DHCP snooping -
Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
10.7472/jksii.2015.16.2.67
Keywords: illegally-copied app, detector, android platform, execution hiding, odex file -
Hyeonwoo Kim, Dongwoo Kwon, Hongtaek Ju, Vol. 16, No. 2, pp. 27-40, Apr. 2015
10.7472/jksii.2015.16.2.27
Keywords: Stateless Firewall, Policy Inference, Attack Detection Threshold, Active Probing, Inference Parameters, Sweep-line Algorithm -
Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
10.7472/jksii.2014.15.1.157
Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern