• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detect ]" (102)
  1. 51. Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis
    Dong-Wook Kim, Gun-Yoon Shin, Ji-Young Yun, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 3, pp. 45-52, Jun. 2021
    10.7472/jksii.2021.22.3.45
    Keywords: Unknown Attack, Discrete wavelet transform, Anomaly Detection, One-class SVM
  2. 52. A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection
  3. 53. Intelligent Abnormal Situation Event Detections for Smart Home Users Using Lidar, Vision, and Audio Sensors
    Da-hyeon Kim, Jun-ho Ahn, Vol. 22, No. 3, pp. 17-26, Jun. 2021
    10.7472/jksii.2021.22.3.17
    Keywords: Smart home. Intelligent, Abnormal detections, Sensor fusing, algorithm
  4. 54. An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining
    Jiyoung Yun, Gun-Yoon Shin, Dong-Wook Kim, Sang-Soo Kim, Myung-Mook Han, Vol. 22, No. 2, pp. 77-87, Apr. 2021
    10.7472/jksii.2021.22.2.77
    Keywords: Explainable AI, Log anomaly detection, Bayesian Probability, Rule Extraction
  5. 55. A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network
    JiHoon Yoo, Byeongjun Min, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 2, pp. 29-39, Apr. 2021
    10.7472/jksii.2021.22.2.29
    Keywords: NSL-KDD, Network intrusion detection, CNN, Discretization of Continuous
  6. 56. Network Intrusion Detection with One Class Anomaly Detection Model based on Auto Encoder
    Byeoungjun Min, Jihoon Yoo, Sangsoo Kim, Dongil Shin, Dongkyoo Shin, Vol. 22, No. 1, pp. 13-22, Feb. 2021
    10.7472/jksii.2021.22.1.13
    Keywords: Anomaly Detection, Network intrusion detection, Autoencoder, NSL-KDD
  7. 57. Regeneration of a defective Railroad Surface for defect detection with Deep Convolution Neural Networks
  8. 58. A Feature-Based Malicious Executable Detection Approach Using Transfer Learning
    Yue Zhang, Hyun-HoYang, Ning Gao, Vol. 21, No. 5, pp. 57-65, Oct. 2020
    10.7472/jksii.2020.21.5.57
    Keywords: Malicious Executable Detection, Transfer Learning, Feature-Based
  9. 59. Design of Video Pre-processing Algorithm for High-speed Processing of Maritime Object Detection System and Deep Learning based Integrated System
  10. 60. Deep Learning-based Abnormal Behavior Detection System for Dementia Patients
    Kookjin Kim, Seungjin Lee, Sungjoong Kim, Jaegeun Kim, Dongil Shin, Dong-kyoo shin, Vol. 21, No. 3, pp. 133-144, Jun. 2020
    10.7472/jksii.2020.21.3.133
    Keywords: Abnomaly detection, deep-learning, Autoencoder, Long Short-Term Memory models