Digital Library
Search: "[ keyword: EV ]" (158)
-
Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
10.7472/jksii.2013.14.2.61
Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process -
Gwangbum Pyun, Unil Yun, Vol. 14, No. 1, pp. 63-0, Feb. 2013
10.7472/jksii.2013.14.63
Keywords: approximate frequent pattern mining, Chernoff technique, probabilistic technique, Performance Evaluation, scalability -
Jongmin Yun, Bomin Choi, Myung-Mook Han, Su-Hyun Kim, Vol. 13, No. 5, pp. 21-32, Oct. 2012
10.7472/jksii.2012.13.5.21
Keywords: JDL, Threat Evaluation, Fuzzy, Bayesian Network, Fuzzy-Bayesian Network -
Nguyen Tran Lan Anh, Guee-Sang Lee, Vol. 13, No. 4, pp. 53-62, Aug. 2012
10.7472/jksii.2012.13.4.53
Keywords: Object segmentation, level set, active contour model -
Viet Vo, Thang Minh Hoang, Chang-Moo Lee, Deok-Jai Choi, Vol. 13, No. 4, pp. 23-32, Aug. 2012
10.7472/jksii.2012.13.4.23
Keywords: Activity recognition, falling event, context aware, accelerometer sensor, orientation sensor -
Woo-Sik Lee, Nam-Gi Kim, Vol. 13, No. 1, pp. 75-82, Feb. 2012
10.7472/jksii.2012.13.1.75
Keywords: RFID Device Management Policy, ISO-IEC 24791-3, RDMPDL: RFID-devices Management Policy Definition Language, Policy Device Management API -
Jun-Chul Chun, Dong-Sun Kim, Vol. 12, No. 6, pp. 117-128, Dec. 2011
Keywords: Medication Image Retrieval, Shape Classification, Color Matching, HSV Color Model, Hu-Moment -
Dong-Il Cho, Sung-Yul Rhew, Vol. 12, No. 4, pp. 181-0, Aug. 2011
Keywords: Server-Push, Web Bidirectional Communication, Comet, Event-Driven Architecture -
Nhan Nguyen-Thanh, In-Soo Koo, Vol. 12, No. 4, pp. 35-44, Aug. 2011
Keywords: cognitive radio, spectrum sensing, collaborative spectrum sensing, sequential fusion, Dempster Shafer theory of evidence -
Jun-Sang Park, Sung-Ho Yoon, Myung-Sup Kim, Vol. 12, No. 3, pp. 89-100, Jun. 2011
Keywords: Application-Level Traffic Classification, Payload-Signature, Real-time classification