Digital Library
Search: "[ keyword: 앱 ]" (15)
-
Dae-gyu Kim, Chang-soo Kim, Vol. 23, No. 2, pp. 61-70, Apr. 2022
10.7472/jksii.2022.23.2.61
Keywords: Hidden Vault Application, Anti-forensics, XML, Text Mining, Keyword Frequency Analysis -
Eunju Park, Seungjun Han, Jimin Yoon, Hankyu Lim, Vol. 22, No. 2, pp. 41-50, Apr. 2021
10.7472/jksii.2021.22.2.41
Keywords: Mobile Application, Scheduler Application, Data Share, App Usability -
Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
10.7472/jksii.2019.20.2.61
Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection. -
4. Development of Android App for Suppor ting Smooth Multimedia Streaming Service Using Frame BufferSang-min Seo, Jonnho Kwon, Yoon-Ho Choi, Vol. 17, No. 1, pp. 55-64, Feb. 2016
10.7472/jksii.2016.17.1.55
Keywords: Mobile Device, android app, jni, frame buffer, stream service -
Beomsoo Shim, Hanjun Lee, Donghee Yoo, Vol. 17, No. 1, pp. 15-22, Feb. 2016
10.7472/jksii.2016.17.1.15
Keywords: open government data, Big data, application, Recommendation System, case-based reasoning(CBR), Data Mining -
Ji-Young Jeon, JiYoon Chun, Min Hong, Hyo-Sub Yum, Young-Hwan Choi, Yoo-Joo Choi, Vol. 16, No. 4, pp. 25-38, Aug. 2015
10.7472/jksii.2015.16.4.25
Keywords: Augmented Reality, Interactive Mobile, Authoring Tool, Mobile App -
Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
10.7472/jksii.2015.16.2.67
Keywords: illegally-copied app, detector, android platform, execution hiding, odex file -
Jaehee Cho, Sun Jin Kim, Vol. 16, No. 1, pp. 101-0, Feb. 2015
10.7472/jksii.2015.16.1.101
Keywords: Diet/Exercise Apps, Internet Information Use Efficacy, Internet Information Credibility, Channel Expansion Theory, Technology Acceptance Model -
Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
10.7472/jksii.2014.15.4.135
Keywords: Mobile Application, Development Process Model, Design Method with Diagram -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism