• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detect ]" (108)
  1. 21. Realistic Avatar Face Generation Using Shading Mechanism
    Park Yeon-Chool, Vol. 5, No. 5, pp. 79-92, Oct. 2004
    Keywords: Face Detection, Facial Feature Extraction, Facial Caricaturing
  2. 22. An Analysis of Intrusion Pattern Based on Backpropagation Algorithm
    Woo Chong-Woo, Kim Sang-Young, Vol. 5, No. 5, pp. 93-104, Oct. 2004
    Keywords: Intrusion Detection System, Back-propagation, KDD Cup '99
  3. 23. Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links
    Roh Byeong-hee, Vol. 5, No. 4, pp. 23-34, Aug. 2004
    Keywords: Network Security, Attack Detection, Attack Traffic Modeling
  4. 24. A Hybrid Watermarking Scheme for Color Images
  5. 25. Intrusion Detection System Using the Correlation of Intrusion Signature
  6. 26. A Hybrid Digital Watermarking Technique for Copyright Protection and Tamper Detection on Still images
  7. 27. Detection of Facial Region and features from Color Images based on Skin Color and Deformable Model
    , , , Vol. 3, No. 6, pp. 13-24, Dec. 2002
    Keywords: face images, Detection of Facial Region, Skin Color, Deformable Model
  8. 28. A Method for 3D Human Pose Estimation based on 2D Keypoint Detection using RGB-D information
    Seohee Park, Myunggeun Ji, Junchul Chun, Vol. 19, No. 6, pp. 41-51, Dec. 2018
    10.7472/jksii.2018.19.6.41
    Keywords: video surveillance, Object Detection, Keypoint Detection, Human Pose Estimation, Deep Learning
  9. 29. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  10. 30. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature