Digital Library
Search: "[ keyword: Detection ]" (187)
Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment
Jae Kook Lee , Sung Jun Kim , Joon Woo , Chan Yeol Park KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 6, pp. 205-212,
Jun.
2015
10.3745/KTCCS.2015.4.6.205
10.3745/KTCCS.2015.4.6.205
An Enhanced Step Detection Algorithm with Threshold Function under Low Sampling Rate
Bo Yeon Kim , Yun Seok Chang KIPS Transactions on Computer and Communication Systems,
Vol. 4, No. 2, pp. 57-64,
Feb.
2015
10.3745/KTCCS.2015.4.2.57
10.3745/KTCCS.2015.4.2.57
A Plagiarism Detection Technique for Source Codes Considering Data Structures
Ki Hwa Lee , Yeo Neo Kim , Gyun Woo KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 6, pp. 189-196,
Jun.
2014
10.3745/KTCCS.2014.3.6.189
10.3745/KTCCS.2014.3.6.189
A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection
Munkhbaatar Doyoddorj KIPS Transactions on Computer and Communication Systems,
Vol. 3, No. 5, pp. 163-172,
May.
2014
10.3745/KTCCS.2014.3.5.163
10.3745/KTCCS.2014.3.5.163
Security Check Scheduling for Detecting Malicious Web Sites
Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 9, pp. 405-412,
Sep.
2013
10.3745/KTCCS.2013.2.9.405
10.3745/KTCCS.2013.2.9.405
Accuracy Improvement Methode of Step Count Detection Using Variable Amplitude Threshold
Uk Jae Ryu , En Tae Kim , Kyung Ho An , Yun Seok Chang KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 6, pp. 257-264,
Jun.
2013
10.3745/KTCCS.2013.2.6.257
10.3745/KTCCS.2013.2.6.257
A Multi-objective Ant Colony Optimization Algorithm for Real Time Intrusion Detection Routing in Sensor Network
Seung Ho Kang KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 5, pp. 191-198,
May.
2013
10.3745/KTCCS.2013.2.5.191
10.3745/KTCCS.2013.2.5.191
An Android B1itl1nlark based on API k-gram
Hee Wan Park KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 4, pp. 177-180,
Apr.
2013
10.3745/KTCCS.2013.2.4.177
10.3745/KTCCS.2013.2.4.177
Feature Selection with PCA based on DNS Query for Malicious Domain Classification
KIPS Transactions on Computer and Communication Systems,
Vol. 1, No. 1, pp. 55-60,
Oct.
2012
10.3745/KTCCS.2012.1.1.55
10.3745/KTCCS.2012.1.1.55
Design of High-performance Pedestrian and Vehicle Detection Circuit using Haar-Like Features
Kyeong Soon Cho , Soo Jin Kim , Sang Kyun Park , Seon Young Lee The KIPS Transactions:PartA,
Vol. 19, No. 4, pp. 175-180,
Aug.
2012
10.3745/KIPSTA.2012.19.4.175
10.3745/KIPSTA.2012.19.4.175