Digital Library
Search: "[ keyword: similarity ]" (16)
-
Ji-Hyun Choi, Hyun Ahn, Vol. 25, No. 2, pp. 39-47, Apr. 2024
10.7472/jksii.2024.25.2.39
Keywords: Time-series Similarity, Anomaly Detection, Subsequences, Spearman’s Rank Correlation Coefficient -
Chang-hee Choi, Chan-ho Shin, Sung-uk Shin, Vol. 23, No. 6, pp. 1-13, Dec. 2022
10.7472/jksii.2022.23.6.1
Keywords: Cyber Attack, attack group similarity, attack group classification, APT, MITRE ATT&CK -
Danielle Lee, Nak-Jun Sung, Jung-Gyu Lee, Jin Wook Choi, Seung-Ryul Jeong, Chul-Hyun Kim, Ahyoung Lee, Min Hong, Vol. 18, No. 4, pp. 7-18, Aug. 2017
10.7472/jksii.2017.18.4.07
Keywords: Online Social Network, Information Similarity, Social Structure, Homophily, Badminton Training, Motion Analysis System, IoT sensor, Agility Test, U-Art Communication, Project Management, Performance Measurement, Bipolar Diagram, Dashboard -
Kwang Tek Na, Ju Hong Lee, Vol. 18, No. 3, pp. 19-28, Jun. 2017
10.7472/jksii.2017.18.3.19
Keywords: Collaborative Filtering, Recommender System, co occurrence, similarity, SVD, latent factor model -
Tae-Hoon Kim, Mye Sohn, Vol. 18, No. 2, pp. 61-74, Apr. 2017
10.7472/jksii.2017.18.2.61
Keywords: Documents Cluster Labeling, Information content, WordNet, Similarity Calculation -
Hae-Duck J. Jeong, Myeong-Un Ryu, Min-Jun Ji, You-Been Cho, Sang-Kug Ye, Jong-Suk R. Lee, Vol. 17, No. 2, pp. 19-28, Apr. 2016
10.7472/jksii.2016.17.2.19
Keywords: Anomaly traffic, self-similarity, Hurst parameter, ATMSim, DDoS attack -
Jun Lee, YongJin KWON, Vol. 16, No. 4, pp. 39-50, Aug. 2015
10.7472/jksii.2015.16.4.39
Keywords: Temporal information, Termporal Extraction, Machine Learning, Similarity filtering, Historical information, Historical Object -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis -
Yong-Ju Lee, Vol. 13, No. 3, pp. 115-126, Jun. 2012
10.7472/jksii.2012.13.3.115
Keywords: mashup, Open API, semantic ontology, interactive mashup composition system, similarity search, API composition