Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Investigating the Effectiveness of E-mail Spam Image Data for Phone Spam Image Detection Using Scale Invariant Feature Transform Image Descriptor

    The increased number of spam images in mobile phones has become a big trouble by annoying users steadily. One big issue in develo** an effective phone spam image detection system using machine learning and d...

    So Yeon Kim, Yenewondim Biadgie, Kyung-Ah Sohn in Information Science and Applications (2015)

  2. No Access

    Chapter and Conference Paper

    Enhanced Misuse Case Model: A Security Requirement Analysis and Specification Model

    An information security system of public or private organization should be developed securely and cost-effectively by using security engineering and software engineering technologies, as well as a security req...

    Sang-soo Choi, So-yeon Kim, Gang-soo Lee in Computational Science and Its Applications… (2006)