Digital Library


Search: "[ keyword: Detection ]" (187)
    Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment
    Jae Kook Lee , Sung Jun Kim , Joon Woo , Chan Yeol Park KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 6, pp. 205-212, Jun. 2015
    10.3745/KTCCS.2015.4.6.205

    An Enhanced Step Detection Algorithm with Threshold Function under Low Sampling Rate
    Bo Yeon Kim , Yun Seok Chang KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 57-64, Feb. 2015
    10.3745/KTCCS.2015.4.2.57

    A Plagiarism Detection Technique for Source Codes Considering Data Structures
    Ki Hwa Lee , Yeo Neo Kim , Gyun Woo KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 6, pp. 189-196, Jun. 2014
    10.3745/KTCCS.2014.3.6.189

    A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
    Munkhbaatar Doyoddorj KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 5, pp. 163-172, May. 2014
    10.3745/KTCCS.2014.3.5.163

    Security Check Scheduling for Detecting Malicious Web Sites
    Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 405-412, Sep. 2013
    10.3745/KTCCS.2013.2.9.405

    Accuracy Improvement Methode of Step Count Detection Using Variable Amplitude Threshold
    Uk Jae Ryu , En Tae Kim , Kyung Ho An , Yun Seok Chang KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 6, pp. 257-264, Jun. 2013
    10.3745/KTCCS.2013.2.6.257

    A Multi-objective Ant Colony Optimization Algorithm for Real Time Intrusion Detection Routing in Sensor Network
    Seung Ho Kang KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 191-198, May. 2013
    10.3745/KTCCS.2013.2.5.191

    An Android B1itl1nlark based on API k-gram
    Hee Wan Park KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 4, pp. 177-180, Apr. 2013
    10.3745/KTCCS.2013.2.4.177

    Feature Selection with PCA based on DNS Query for Malicious Domain Classification
    KIPS Transactions on Computer and Communication Systems, Vol. 1, No. 1, pp. 55-60, Oct. 2012
    10.3745/KTCCS.2012.1.1.55

    Design of High-performance Pedestrian and Vehicle Detection Circuit using Haar-Like Features
    Kyeong Soon Cho , Soo Jin Kim , Sang Kyun Park , Seon Young Lee The KIPS Transactions:PartA, Vol. 19, No. 4, pp. 175-180, Aug. 2012
    10.3745/KIPSTA.2012.19.4.175