Return to Article Details Korean Malicious Text Analysis Technique Applying Consonant and Vowel Separation Method Download Download PDF