Subjects : Attack signature
| Type | Year | Title | Cited | Download |
|---|---|---|---|---|
| Journal | 2013 | Mobile Malware Detection Using Correlational Analysis Yoon Seung Yong International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 | ||
| Journal | 2009 | Validation Methods of Suspicious Network Flows for Unknown Attack Detection Kim Ik Kyun International Journal of Computers, v.1, no.3, pp.104-114 | ||
| Conference | 2009 | A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment Kim Ik Kyun International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720 | ||
| Conference | 2008 | An Architecture of Unknown Attack Detection System against Zero-day Worm Kim Ik Kyun International Conference on Applied Computer Science (ACS) 2008, pp.205-211 |
| Status | Year | Patent Name | Country | Family Pat. | KIPRIS |
|---|---|---|---|---|---|
| Registered | 2015 | 시그니처 기반 네트워크 공격 탐지 및 공격 시그니처 생성 방법 및 장치 | KOREA | KIPRIS |
| Type | Year | Research Project | Primary Investigator | Download |
|---|---|---|---|---|
| No search results. | ||||