• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ author: Yun ]" (516)
  1. 261. An Object-Oriented Analysis and Design Methodology for Security of Web Applications
    Kyung-Soo Joo, Jung-Woong Woo, Vol. 14, No. 4, pp. 35-42, Aug. 2013
    10.7472/jksii.2013.14.4.35
    Keywords: Object-Oriented Analysis and Design, Web Application, Security, RBAC, Java EE
  2. 262. A BPM Activity-Performer Correspondence Analysis Method
    Hyun Ahn, Chungun Park, Kwanghoon Kim, Vol. 14, No. 4, pp. 63-72, Aug. 2013
    10.7472/jksii.2013.14.4.63
    Keywords: Business Process Intelligence, Affiliation Network, Correspondence Analysis
  3. 263. Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
    10.7472/jksii.2013.14.3.35
    Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection
  4. 264. A Study on the Actual Condition and Utilization Plan of Smart Devices for Educational Purpose
    Yeongrok Gim, Mihyun Chung, Jaehyoun Kim, Vol. 14, No. 3, pp. 47-56, Jun. 2013
    10.7472/jksii.2013.14.3.47
    Keywords: smart devices, smart learning, efficacy, class types, courses, teaching-learning process
  5. 265. An Analysis on the Vulnerability of Secure Keypads for Mobile Devices
    Yunho Lee, Vol. 14, No. 3, pp. 15-22, Jun. 2013
    10.7472/jksii.2013.14.3.15
    Keywords: Mobile Security, Secure Keypads, Personal Information, Keylogger
  6. 266. A recommendation algorithm which reflects tag and time information of social network
    Hyeon Jo, Jong-Hyun Hong, Joon Yeon Choeh, Soung Hie Kim, Vol. 14, No. 2, pp. 15-24, Apr. 2013
    10.7472/jksii.2013.14.2.15
    Keywords: Recommender System, Social Bookmarking System, Social Network
  7. 267. An Activity-Performer Bipartite Matrix Generation Algorithm for Analyzing Workflow-supported Human-Resource Affiliations
    Hyun Ahn, Kwanghoon Kim, Vol. 14, No. 2, pp. 25-34, Apr. 2013
    10.7472/jksii.2013.14.2.25
    Keywords: Workflow, ICN Workflow Model, Business Process Intelligence, Affiliation Network
  8. 268. Wireless Sensor Node Energy-harvesting Simulator Using Java Threads
    Nico N. Encarnacion, Hyunho Yang, Vol. 14, No. 2, pp. 53-60, Apr. 2013
    10.7472/jksii.2013.14.2.53
    Keywords: WSN(Wireless Sensor Node), Energy Harvesting, Simulator, Java Thread
  9. 269. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  10. 270. Pratical Offloading Methods and Cost Models for Mobile Cloud Computing