1 | Á¦¸ñ(Title) | Malware Detection with Directed Cyclic Graph and Weight Merging | |
---|---|---|---|
ÀúÀÚ(Author) | Eunji Lee Jikyung Jang Hyun Kwon Hyunsoo Yoon Daeseon Choi Shanxi Li Qingguo Zhou Wei Wei | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 09 PP. 3258 ~ 3273 2021. 09 | ||
2 | Á¦¸ñ(Title) | Mathematical Analysis Power Spectrum of M-ary MSK and Detection with Optimum Maximum Likelihood | |
ÀúÀÚ(Author) | Zheng Niu Yuzhong Jiang Shuyan g Jia Zhi Huang Wenliang Zou Gang Liu Yu Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 08 PP. 2900 ~ 2922 2021. 08 | ||
3 | Á¦¸ñ(Title) | Towards the Saturation Throughput Disparity of Flows in Directional CSMA/CA Networks: An Analytical Model | |
ÀúÀÚ(Author) | Jianrui Fan Xinru Zhao Wencan Wang Shengsuo Cai Lijuan Zhang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 4 PP. 1293 ~ 1316 2021. 04 | ||
4 | Á¦¸ñ(Title) | 3D Markov chain based multi-priority path selection in the heterogeneous Internet of Things | |
ÀúÀÚ(Author) | Huan Wu Xiangming Wen Zhaoming Lu Yao Nie | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 11 PP. 5276 ~ 5298 2019. 11 | ||
5 | Á¦¸ñ(Title) | TG-SPSR: A Systematic Targeted Password Attacking Model | |
ÀúÀÚ(Author) | Mengli Zhang Qihui Zhang Wenfen Liu Xuexian Hu Jianghong Wei | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 05 PP. 2674 ~ 2697 2019. 05 | ||
6 | Á¦¸ñ(Title) | Performance Analysis of S-SFR-based OFDMA Cellular Systems | |
ÀúÀÚ(Author) | Yi-Kang Kim Choong-Ho Cho Seok-Ho Yoon Seung-Yeon Kim | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 13 NO. 01 PP. 0186 ~ 0205 2019. 01 | ||
7 | Á¦¸ñ(Title) | Performance Analysis of Cellular Networks with D2D communication Based on Queuing Theory Model | |
ÀúÀÚ(Author) | Jianfang Xin Qi Zhu Guangjun Liang Tiaojiao Zhang Su Zhao | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 06 PP. 2450 ~ 2469 2018. 06 | ||
8 | Á¦¸ñ(Title) | A study on Classification of Insider threat using Markov Chain Model | |
ÀúÀÚ(Author) | Dong-Wook Kim Sung-Sam Hong Myung-Mook Han | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 12 NO. 04 PP. 1887 ~ 1898 2018. 04 | ||
9 | Á¦¸ñ(Title) | Phrase-based Topic and Sentiment Detection and Tracking Model using Incremental HDP | |
ÀúÀÚ(Author) | YongHeng Chen YaoJin Lin WanLi Zuo | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 12 PP. 5905 ~ 5926 2017. 12 | ||
10 | Á¦¸ñ(Title) | Energy Harvesting in Multi-relay Multiuser Networks based on Two-step Selection Scheme | |
ÀúÀÚ(Author) | Weidong Guo Houyuan Tian Qing Wang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 11 NO. 09 PP. 4180 ~ 4196 2017. 09 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.