Digital Library
Search: "[ keyword: 탐지 ]" (48)
-
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
10.7472/jksii.2013.14.3.35
Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection -
Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
10.7472/jksii.2013.14.2.61
Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process -
Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
10.7472/jksii.2012.13.2.41
Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM -
Byung-Mun Lee, Hyun-Ho Shin, Un-Gu Kang, Vol. 12, No. 6, pp. 73-82, Dec. 2011
Keywords: Location-based service, Tracking system -
Moon-Sun Shin, Woo-Jin Paik, Vol. 10, No. 2, pp. 1-14, Apr. 2009
Keywords: alert data, IDS, sequential pattern mining, prefixSpan -
Jae-Young Chang, Jong-Myoung Park, Han-Joon Kim, Vol. 8, No. 6, pp. 43-54, Dec. 2007
Keywords: network intrusion system, outlier detection algorithm, density function