Directions
Unsupervised Hadoop-based P2P Botnet Detection with Threshold Setting
Huseynov, Khalid, 김광조
CISC-W'14
2014
[] []
Untraceable Blind Packet Forwarding using Centralized path control
Lee, Youngmi, Younggi Kim, Younghee LEE
International Conference for Military Communications (MILCOM 2014)
2014
[] []
User Profile Extraction form Twitter for Personalized News Recommendation
Lee, Won-Jo, Oh, KyoJoong, Lim, Chae-Gyun, Ho-Jin Choi
International Conference on Advanced Communication Technology (ICACT)
2014
[]
Utilizing Global and Path Information with Language Modelling for Hierarchical Text Classification
Heung-Seon Oh, Sung-Hyon Myaeng
JOURNAL OF INFORMATION SCIENCE
2014
[]
Utilizing similarity relationships among existing data for high accuracy processing of content-based image retrieval
Hai Thanh Mai, Myoung Ho Kim
MULTIMEDIA TOOLS AND APPLICATIONS
2014
[]
Victory: Versatile Internet of Things Application on Mobile Dynamic Service Composition Framework
우성필, Sehyeon Heo, JANGGWAN IM, Daeyoung KIM
The 4th International Conference on Internet of Things (IoT 2014)
2014
[]
VoG: Summarizing and Understanding Large Graphs
Danai Koutra, U Kang, Jilles Vreeken, Christos Faloutsos
SIAM International Conference on Data Mining (SDM) 2014
2014
[]
Wearable wireless interface based on brain activity and eye movement
Kim, Yongwon, Sungho Jo
14th International Conference on Control, Automation and Systems
2014
Weight Balancing on Boundaries and Skeletons
Barba, Luis, Otfried Cheong, De Carufel, Jean-Lou, Dobbins, Michael Gene, Fleischer, Rudolf, Kawamura, Akitoshi, Korman, Matias, Okamoto, Yoshio, Pach, Janos, Tang, Yuan, Tokuyama, Takeshi, Verdonschot, Sander, Wang, Tianhao
The 30th Annual Symposium on Computational Geometry (SOCG 2014)
2014
[] []
Who can survive in CAESAR competition at round zero?
Kim, HakJu, Kwangjo Kim
SCIS2014
2014
[] []
Wikipedia-based query phrase expansion in patent class search
Al-Shboul, Bashar, Sung-Hyon Myaeng
INFORMATION RETRIEVAL
2014
[]
escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구
김광조, 이동수
한국정보보호학회지
2014
[]
vCache: Providing a Transparent View of the LLC in Virtualized Environments
Daehoon Kim, Hwanju Kim, Jaehyuk Huh
IEEE COMPUTER ARCHITECTURE LETTERS
2014
[]
가상 머신 기반으로 난독화된 실행파일의 구조 및 원본의미 추출 동적 방법
이성호, 한태숙
정보과학회논문지
2014
[]
가상화 기법으로 난독화된 실행 파일의 동적 분석을 통한 핸들러 간략화
원지혜, 한태숙
Korea Computer Congress 2014
2014
[]
가상화를 이용하여 난독화된 바이너리의 제어 흐름 재건
황준형, 한태숙
Korea Computer Congress 2014
2014
[]
경량 암호를 이용한 IoT Secure SNAIL 플랫폼 구성(Ⅰ)
정제성, 김경민, 김학주, 박준정, 안수현, 이동수, 최락용, 김광조, 김대영
CISC-W'14
2014
[] []
관심지점 탐지를 위한 모호성 해소 방법 (A Disambiguation Method for Point of Interest Detection)
김경민
관광연구저널
2014
[]
군사기밀 유출자에 대한 손해배상 제도 적용 방안
박준정, 김광조
CISC-W'14
2014
[] []
규칙 기반 한국어 시간 정보 추출
정영섭, 도효진, 임준호, 최호진
한글 및 한국어 정보처리 학술대회
2014
[]