Digital Library
Search: "[ keyword: ICA ]" (308)
-
Ju-Hyun Hong, Vol. 24, No. 3, pp. 67-78, Jun. 2023
10.7472/jksii.2023.24.3.67
Keywords: social media network, influential spreader, political agenda, issue diffusion, Network analysis -
Yi-na Jeong, Yong-bo Sim, Su-rak Son, Vol. 24, No. 3, pp. 43-50, Jun. 2023
10.7472/jksii.2023.24.3.43
Keywords: facial landmark, deeplearning, facial emotion classification -
Hyun-kyoung Song, Seongjin Ahn, Vol. 24, No. 3, pp. 27-41, Jun. 2023
10.7472/jksii.2023.24.3.27
Keywords: AI robot, artificial intelligence robot, AI robot risk, AI robot risk prevention, AI robot risk measurement indicators, AI robot measurement indicators -
Gwangyeon Lee, Jinsoo Kim, Kisoeb Park, Moonseong Kim, Vol. 24, No. 1, pp. 27-37, Feb. 2023
10.7472/jksii.2023.24.1.27
Keywords: Lucas-Padovan Sequence, Topological Interconnection Network, Lucas-Padovan Cubes -
Dong-il Cho, Vol. 24, No. 1, pp. 9-15, Feb. 2023
10.7472/jksii.2023.24.1.9
Keywords: RESTful APIs, Single-Page Application, ViewModel, Model Mapping -
Se-Jin Kim, Vol. 24, No. 1, pp. 1-7, Feb. 2023
10.7472/jksii.2023.24.1.1
Keywords: cellular network, Heterogeneous Network, Device-to-device communication, dynamic, Channel Management, interference management -
Wongyu Hwangbo, Dong-Kyoo Shin, Vol. 23, No. 6, pp. 49-58, Dec. 2022
10.7472/jksii.2022.23.6.49
Keywords: Military mobile phone, Personal Information Protection, telecommunication agency, Safe Use, My Data, right to transfer and port personal information -
Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
10.7472/jksii.2022.23.6.1
Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK -
Kibeom Kim, Youngho Cho, Vol. 23, No. 5, pp. 103-110, Oct. 2022
10.7472/jksii.2022.23.5.103
Keywords: Bitcoin Network, Botnet C&C Communication, Encryption, Cyber Threat -
Min-Gyu Kim, Myung-Mook Han, Vol. 23, No. 5, pp. 79-85, Oct. 2022
10.7472/jksii.2022.23.5.79
Keywords: Extreme Random Forest, Artificial neural network, Anomaly Detection, Anomaly Detection and Attack type Classification, Network intrusion detection