• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Detection ]" (103)
  1. 41. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  2. 42. Image Detecting System for Pinhole with Photoelectric Sensors
    Min-Goo Kang, Moon-Shin Zo, Jong-Suh Jeon, Vol. 13, No. 3, pp. 17-22, Jun. 2012
    10.7472/jksii.2012.13.3.17
    Keywords: APD, pinhole, fiberoptic waveguide, photoelectric, image detection system
  3. 43. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    10.7472/jksii.2012.13.2.41
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM
  4. 44. Saturated Performance Analysis of IEEE 802.11 DCF with Imperfect Channel Sensing
    Soo-Young Shin, Seog Chae, Vol. 13, No. 1, pp. 7-14, Feb. 2012
    10.7472/jksii.2012.13.1.7
    Keywords: IEEE 802.11, imperfect channel sensing, missed-detection, False Alarm, Performance
  5. 45. Car Collision Verification System for the Ubiquitous Parking Management
  6. 46. A Speaker Detection System based on Stereo Vision and Audio
    Jun-Ho An, Kwang-Seok Hong, Vol. 11, No. 6, pp. 21-30, Dec. 2010
    Keywords: Source Localization, Stereo vision, Speaker Detection
  7. 47. Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data
    Hyung-Woo Lee, Vol. 11, No. 6, pp. 73-86, Dec. 2010
    Keywords: Integrated Event Log, Web Attack Detection, internet security
  8. 48. Fast Hough circle detection using motion in video frames
    Hye-Min Won, Kyoung-Mi Lee, Vol. 11, No. 6, pp. 31-40, Dec. 2010
    Keywords: Hough Transform, Circle detection, Real-time processing
  9. 49. Robustness Analysis and Improvement on Transformed-key Asymmetric Watermarking System
  10. 50. Selecting Minimized Input Features for Detecting Automatic Fall Detection Based on NEWFM