• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 유사도 ]" (10)
  1. 1. Optimal Similarity Calculation using Genetic Algorithms in Collaborative Filtering
    Soojung Lee, Vol. 25, No. 5, pp. 87-94, Oct. 2024
    10.7472/jksii.2024.25.5.87
    Keywords: Recommender System, Collaborative Filtering, Similarity Measure, genetic algorithm
  2. 2. Efficient Time-Series Similarity Measurement and Ranking Based on Anomaly Detection
    Ji-Hyun Choi, Hyun Ahn, Vol. 25, No. 2, pp. 39-47, Apr. 2024
    10.7472/jksii.2024.25.2.39
    Keywords: Time-series Similarity, Anomaly Detection, Subsequences, Spearman’s Rank Correlation Coefficient
  3. 3. Cyber attack group classification based on MITRE ATT&CK model
    Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
    10.7472/jksii.2022.23.6.1
    Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK
  4. 4. Collaborative Filtering using Co-Occurrence and Similarity information
    Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
    10.7472/jksii.2017.18.3.19
    Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model
  5. 5. Representative Labels Selection Technique for Document Cluster using WordNet
    Tae-Hoon Kim, Mye Sohn, Vol. 18, No. 2, pp. 61-74, Apr. 2017
    10.7472/jksii.2017.18.2.61
    Keywords: Documents Cluster Labeling, Information content, WordNet, Similarity Calculation
  6. 6. A Proposal of Methods for Extracting Temporal Information of History-related Web Document based on Historical Objects Using Machine Learning Techniques
  7. 7. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  8. 8. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  9. 9. Customized Knowledge Creation Framework using Context- and intensity-based Similarity
  10. 10. Extracting Blood Vessels through Similarity Analysis and Intensity Correction
    Jang Seok-Woo, Vol. 7, No. 4, pp. 33-44, Aug. 2006
    Keywords: Similarity Analysis, Intensity Correction, Blood Vessels, Angiography