Mobile QR Code QR CODE : The Transactions P of the Korean Institute of Electrical Engineers
The Transactions P of the Korean Institute of Electrical Engineers

Korean Journal of Air-Conditioning and Refrigeration Engineering

ISO Journal TitleTrans. P of KIEE
  • Indexed by
    Korea Citation Index(KCI)

References

1 
Wikipedia. “harmful sites,” https://ko.wikipedia.org/wiki/유해사이트.URL
2 
Y. D. Seo. “Even if illegal and harmful information sites are blocked, they only change the number and operate them openly,” https://www.koit.co.kr/news/articleView.html?idxno=104645.URL
3 
H. W. Kim, “21,043 webtoon illegal distribution sites for 5 years,” https://it.chosun.com/site/data/html_dir/2020/10/21/20 20102101118.html.URL
4 
Kocca, “Taking precautions to eradicate illegal distribution of webtoons,” https://www.kocca.kr/kocca/koccanews/report view.do?menuNo=204767&nttNo=428.URL
5 
B. G. Song, “A Study on the Illegal Gambling of Children and Adolescents through Illegal Webtoon Sites,” Korean Assoc. Addiction Crime Rev., vol. 12, no. 2, pp. 1-17, 2022.URL
6 
W. H. Kim, H. J. Yu, and W. B. Ji, “A Study of the Experts’ Perception on the Improvement of Advertiseme ts in Copyright Infringement Websites,” Asia-Pacific J. Convergent Res. Interchange, vol. 8, no. 1, pp. 25-36, 2022.URL
7 
J. Jang, K. Lim, and S. Lee, “An Harmful site collection system using Characteristic of HTML and URL,” J. Digital Forensics, vol. 16, no. 1, pp. 54-63, 2022.URL
8 
S. Choo, Y. Hwang, and S. Lee, “Methods for Collecting Harmful Websites Using Web Crawling,” J. Digit. Forensics, vol. 15, no. 3, pp. 127-138, 2021.URL
9 
J. Jeong and S. Lee, “Blocking method of harmful sites based on domain change pattern,” J. Digital Forensics, vol. 15, no. 3, pp. 39-53, 2021.URL
10 
H. Kang, Y. Choi, and S. Lee, “Analysis of advertisers by tracking banner ads on piracy websites,” J. Digital Forensics, vol. 15, no. 3, pp. 15-26, 2021.URL
11 
H. H. Kim. “73% of illegal webtoon banners are illegal gambling sites,” https://www.ajunews.com/view/2022101916 4958143.URL
12 
M. Sajjad, I. U. Haq, J. Lloret, W. Ding, and K. Muha mmad, “Robust image hashing based efficient authentic ation for smart industrial environ ment,” IEEE Trans. Ind. Inform., vol. 15, no. 12, pp. 6541-6550, 2019.DOI
13 
E. Taskesen, “Detection of Duplicate Images Using Image Hash Functions,” Towards Data Science, Jan. 29, 2022. [Online]. Available: https://towardsdatascience.com/detection-of-duplicat eimages-using-image-hash-functions-4d9c53f04a75.URL