Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 S. Lee, S. Lee, J. Lee, and H. Youm, "Extraction of Network Threat Signatures Using Latent Dirichlet Allocation", Journal of Internet Computing and Services(JICS), Vol. 19, No. 1 pp. 1-10, 2018. http://dx.doi.org/10.7472/jksii.2018.19.1.1/   DOI View Article
2 J. Chung, Y. Park, and W. Kim, "Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling ", Journal of Internet Computing and Services, Vol. 19, No. 4, pp. 53-63, 2018. http://dx.doi.org/10.7472/jksii.2018.19.4.53/   DOI View Article
3 O. Han and J. Kim, "Examining the relationship between educational effectiveness and computational thinking in smart learning environment", Journal of Internet Computing and Services(JICS), Vol. 19, No. 2, pp. 57-67, 2018. https://doi.org/10.7472/jksii.2018.19.2.57/   DOI View Article
4 O. Han and J. Kim, "A Study on the Technology Utilization for Smart Education in the 4th Industrial Revolution Era", Journal of Internet Computing and Services(JICS), Vol. 19, No. 4, pp. 71-82, 2018. https://doi.org/10.7472/jksii.2018.19.4.71/   DOI View Article
5 Y. Bae and W. Jun, "A Study on Design and Implementation of a Programming Teaching Model Using Emotional Intelligence", Journal of Internet Computing and Services(JICS), Vol. 19, No. 6, pp. 125-132, 2018. https://doi.org/10.7472/jksii.2018.19.6.125/   DOI View Article
6 H. Choi, J. Lee, B. Lee, "Supporting Systematic Software Test Process in R&D Project with Behavioral Models," Journal of Internet Computing and Services(JICS), Vol. 19, No. 2, pp.43-48, 2018. http://dx.doi.org/10.7472/jksii.2018.19.2.43/   DOI View Article
7 H. G. Kim et al. "Visualization of Malwares for Classification Through Deep Learning," Journal of Internet Computing and Services(JICS), 19(5), pp. 67-75, Oct. 2018. http://dx.doi.org/10.7472/jksii.2018.19.5.67/   DOI View Article
8 H. Park, "Personal Credit Evaluation System through Telephone Voice Analysis: By Support Vector Machine," Journal of Internet Computing and Services, vol. 19, no. 6, pp. 63-72, 2018. https://doi.org/10.7472/jksii.2018.19.6.63/   DOI View Article
9 J Ma, S Lee, KW Cho and YK Suh, "Design and Implementation of an Execution-Provenance Based Simulation Data Management Framework for Computational Science Engineering Simulation Platform," Journal of Internet Computing and Services, Vol. 19, No. 1, pp. 77-86, 2018. http://dx.doi.org/10.7472/jksii.2018.19.1.77./   DOI View Article
10 G. Shin, D. Kim, S. Hong and M. Han, "The Identification Framework for source code author using Authorship Analysis and CNN," Journal of Internet Computing and Services, vol. 19, no. 5, pp. 33-41, 2018. https://doi.org/10.7472/jksii.2018.19.5.33/   DOI View Article