Digital Library
Search: "[ author: Yun ]" (489)
-
Hak Geon Lee, Chang Ho Yun, Jong Won Park, Yong Woo Lee, Vol. 15, No. 3, pp. 45-52, Jun. 2014
10.7472/jksii.2014.15.3.45
Keywords: Ubiquitous City, U-City, Cloud computing, System Architectures, MapReduce, Hadoop -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism -
Gwanghyung Lee, Dongkyoo Shin, Dongil Shin, Vol. 15, No. 3, pp. 11-20, Jun. 2014
10.7472/jksii.2014.15.3.11
Keywords: NUI/NUX Framework, Hand Mouse, Kinect -
Kyung Hee Song, Kyu Tae Kwak, Soo Kyung Park, Bong Gyou Lee, Vol. 15, No. 2, pp. 109-128, Apr. 2014
10.7472/jksii.2014.15.2.109
Keywords: Standardization, Actor Network Theory, Socio-Technical Interpretation, 3D Broadcasting -
Hyungseok Choi, JaeYong Lee, ByungChul Kim, Vol. 15, No. 2, pp. 1-8, Apr. 2014
10.7472/jksii.2014.15.2.01
Keywords: Mobile Ad Hoc Network, MANET, connectivity, optimum transmission range, HATA propagation model -
Hee Yeon Min, Jin Hyung Park, Dong Hoon Lee, In Seok Kim, Vol. 15, No. 1, pp. 157-170, Feb. 2014
10.7472/jksii.2014.15.1.157
Keywords: Outlier Detection, User Input Pattern, E-finance Transaction Pattern -
Jong-Hwan Kong, Ik Kyun Kim, Myung-Mook Han, Vol. 15, No. 1, pp. 125-134, Feb. 2014
10.7472/jksii.2014.15.1.125
Keywords: Malicious data, Propagation Model, Social Network, Internet Worm -
Do-Hyung Park, Vol. 15, No. 1, pp. 73-88, Feb. 2014
10.7472/jksii.2014.15.1.73
Keywords: Online Community, Lurking Behavior, Social Network, Lurker -
Okkyung Choi, Wooyeol Jung, Bong Gyou Lee, Seungbin Moon, Vol. 15, No. 1, pp. 55-62, Feb. 2014
10.7472/jksii.2014.15.1.55
Keywords: Mobile Cloud Computing, Human-friendly Robot Service, User Authentication, Big Data Processing Technology, Log-data Analysis -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis