• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 탐지 ]" (48)
  1. 41. Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
    10.7472/jksii.2013.14.3.35
    Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection
  2. 42. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  3. 43. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    10.7472/jksii.2012.13.2.41
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM
  4. 44. Efficient Tracking System for Passengers with the Detection Algorithm of a Stopping Vehicle
    Byung-Mun Lee, Hyun-Ho Shin, Un-Gu Kang, Vol. 12, No. 6, pp. 73-82, Dec. 2011
    Keywords: Location-based service, Tracking system
  5. 45. Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern
    Moon-Sun Shin, Woo-Jin Paik, Vol. 10, No. 2, pp. 1-14, Apr. 2009
    Keywords: alert data, IDS, sequential pattern mining, prefixSpan
  6. 46. Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism
    Hyung-Woo Lee, Vol. 9, No. 6, pp. 37-48, Dec. 2008
    Keywords: SIP, VoIP
  7. 47. MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network
    Je-Gyeong Jo, Hyung-Woo Lee, Vol. 9, No. 4, pp. 85-96, Aug. 2008
    Keywords: SIP, VoIP
  8. 48. An Outlier Cluster Detection Technique for Real-time Network Intrusion Detection Systems