• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: similarity ]" (18)
  1. 1. Optimal Similarity Calculation using Genetic Algorithms in Collaborative Filtering
    Soojung Lee, Vol. 25, No. 5, pp. 87-94, Oct. 2024
    10.7472/jksii.2024.25.5.87
    Keywords: Recommender System, Collaborative Filtering, Similarity Measure, genetic algorithm
  2. 2. Federated learning-based client training acceleration method for personalized digital twins
  3. 3. Efficient Time-Series Similarity Measurement and Ranking Based on Anomaly Detection
    Ji-Hyun Choi, Hyun Ahn, Vol. 25, No. 2, pp. 39-47, Apr. 2024
    10.7472/jksii.2024.25.2.39
    Keywords: Time-series Similarity, Anomaly Detection, Subsequences, Spearman’s Rank Correlation Coefficient
  4. 4. Cyber attack group classification based on MITRE ATT&CK model
    Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
    10.7472/jksii.2022.23.6.1
    Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK
  5. 5. Information-Sharing Patterns of A Directed Social Network: The Case of Imhonet
  6. 6. Collaborative Filtering using Co-Occurrence and Similarity information
    Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
    10.7472/jksii.2017.18.3.19
    Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model
  7. 7. Representative Labels Selection Technique for Document Cluster using WordNet
    Tae-Hoon Kim, Mye Sohn, Vol. 18, No. 2, pp. 61-74, Apr. 2017
    10.7472/jksii.2017.18.2.61
    Keywords: Documents Cluster Labeling, Information content, WordNet, Similarity Calculation
  8. 8. DDoS Attack Analysis Using the Improved ATMSim
    Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
    10.7472/jksii.2016.17.2.19
    Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack
  9. 9. A Proposal of Methods for Extracting Temporal Information of History-related Web Document based on Historical Objects Using Machine Learning Techniques
  10. 10. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism