1 |
H. Son, K. Kim, Y, Lee, "A File Name Identification Method for P2P and Web Hard Applications through Traffic Monitoring," Journal of KIISE, vol. 37, no. 6, pp. 477-482, 2010.
|
2 |
Y. Suh, W. Yoo, Y. Kim, W. Kim, "A Study of Copyright Infringement and Technology Measures in a Mobile Environment," Korea Institute of Information Technology Magazine, vol. 13, no. 1, pp. 19-25, 2015.
DOI
|
3 |
C. Hwang, J. Ha, T. Lee, "Modified File Title Normalization Techniques for Copyright Protection," journal of Information and Security, vol. 19, no. 4, pp. 133-142, Oct. 2019.
DOI
|
4 |
S. Kim, J. Kim, "An Analysis on the Error Probability of A Bloom Filter," Journal of The Korea Institute of Information Security & Cryptology, vol. 24, no. 5, pp. 809-815, Oct. 2014.
DOI
|
5 |
C. Hwang, J. Kim, Y. Lee, H. Kim, T. Lee, "High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology," Journal of the Korea Institute of Information Security & Crypthlogy, vol. 30, no. 6, pp. 1067-1078, 2020.
|
6 |
S. Son, "Copyright Protection on Artificial Intelligence generated Content," Journal of the Korea Association For Informedia Law, vol. 20, No. 3, pp. 83-110, 2017.
|
7 |
Y. Oh, G. Jang, H. Kwon, J. Lim, "A Study on the Copyright Protection Liability of Online Service Provider and Filtering Measure," Journal of the Korea Institute of Information Security & Cryptology, vol. 20, no. 6, pp. 97-109, 2010.
DOI
|
8 |
Y. Kim, "Improvement Plan for Special Types of Online Service Provider Responsibility System - Focusing on Technical Measures and Corrective Order and Correction Recommendation System -," Dankook Law Review, vol. 40, no. 1, pp. 213-236, 2016.
DOI
|
9 |
S. Oh, "A Study on the Copyright New Service Model Using Block-chain Technology," Korea Copyright Commission, pp. 1-174, Jan. 04. 2018.
|
10 |
J. Hwang, H. Kim, "Block-chain-based Copyright Management System Capable of Registering Creative Ideas," The Korea Society of Science & Art, vol. 20, no. 5, pp. 57-65, Oct. 2019.
|
11 |
J. Kim, J. Nam, "Analysis of illegal content filtering technology trends," Broadcasting and Media Magazine, vol. 12, no. 4, pp. 53-63, 2007.
|
12 |
C. Li, J. Lu, Y. Lu, "Efficient Merging and Filtering Algorithms for Approximate String Searches," in Proc. of IEEE 24th International Conference on Data Engineering, pp. 257-266, Apr. 2008.
|
13 |
J. Kim, J. Kim, J. Kim, Y. Chin, "Development of the filtering technology of illegal IPTV contents," Korea Institute of Information & Telecommunication Facilities Engineering, pp. 108-111, Aug. 2009.
|
14 |
J. Lee, "A Study on Music Copyright Management Model Using Block Chain Technology," The Korea Society of Science & Art, no. 35, pp. 341-351, Sep. 2018.
|
15 |
J. Kim, C. Hwang, and T. Lee, "Research on heavy uploader profiling technology for illegal content," Journal of Internet Computing and Services, vol. 22, no. 3, pp. 75-83, 2021.
DOI
|
16 |
B. Kim, H. Oh, "A Feature-Based Retrieval Technique for Image Database," The Transactions of the Korea Information Processing Society, vol. 5, no. 11, pp. 2776-2785, 1998.
|
17 |
Y. Kim, D. Shin, "Feature-Based Filtering Technology Performance Evaluation Trend," Korea Institute of Information Technology Magazine, vol. 11, no. 2, pp. 1-7, 2013.
|