Subject

Subjects : Malicious code

  • Articles (30)
  • Patents (3)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2021 A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools   Song-Yi Hwang  Sensors, v.21, no.21, pp.1-23 8 원문
Conference 2020 Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT   Lim Jae Deok  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 2 원문
Journal 2017 DTB-IDS: An Intrusion Detection System Based on Decision Tree using Behavior Analysis for Preventing APT Attacks   Moon Dae Sung  Journal of Supercomputing, v.73, no.7, pp.2881-2895 119 원문
Conference 2016 Visualization of Malware Detection Based on API Call Sequence Alignment   Kim Jonghyun  International Conference on Internet (ICONI) 2016, pp.175-178
Conference 2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Kim Dae Won  International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Conference 2015 Behavior-Based Anomaly Detection on Big Data   Kim Hyun Joo  SRI Security Congress 2015, pp.73-80
Conference 2015 Mobile Security Technology for Smart Devices   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1174-1176
Conference 2015 Testing Data Set for Analyzing Behaviors of Malicious Codes   Kim Youngsoo  International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2015, pp.4-9
Conference 2014 New Approach to Determine Metamorphic Malicious Mobile Code on Android based Smartphones   김상돈  International Conference on Internet (ICONI) 2014, pp.1-6
Conference 2014 Involvers’ Behavior-based Modeling in Cyber Targeted Attack   Kim Youngsoo  International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2014, pp.132-137
Conference 2014 Protection Method from APP Repackaging Attack on Mobile Device with Separated Domain   Lee Yun-Kyung  International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.667-668 3 원문
Conference 2014 Hidden Evasive Server-Side Polymorphic Malicious Apps Detection Mechanism on Android based Smart Phone Devices   문대열  International Conference on Convergence Technology (ICCT) 2014, pp.819-820
Conference 2014 The Phased Classification of Attacking Methods used for Advanced Persistent Threat   Kim Youngsoo  International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN) 2014, pp.1-7
Journal 2013 Energy‐efficient replica detection for resource‐limited mobile devices in the internet of things   Kwantae Cho  IET Communications, v.7, no.18, pp.2141-2150 9 원문
Journal 2013 Mobile Malware Detection Using Correlational Analysis   Yoon Seung Yong  International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58
Conference 2013 DroidVulMon -- Android Based Mobile Device Vulnerability Analysis and Monitoring System   함유정  International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST) 2013, pp.26-31 8 원문
Conference 2013 A Study on Multi-Control Working Position Authentication System in Aviation Security   Lee Deok Gyu  International Conference on Advanced IT, engineering Management (AIM) 2013, pp.226-230
Conference 2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   김현주  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6 원문
Conference 2010 Design of Cyber Attack Precursor Symptom Detection Algorithm through System base Behavior Analysis and Memory Monitoring   정성모  International Conference on Future Generation Communication and Networking (FGCN) 2010 (CCIS 120), v.120, pp.276-283 2 원문
Conference 2009 Hardware Based Data Inspection for USB Data Leakage Prevention   Dong Ho Kang  Communications in Computer and Information Science (CCIS) 2009, pp.57-63 1 원문
Journal 2009 Security Policy Specification for Home Network   Kim Geonwoo  International Journal Ad Hoc and Ubiquitous Computing, v.4, no.6, pp.372-378 1 원문
Conference 2009 Multi-Region based Clustering Analysis Method for Unknown Malicious Code Detection   Byoung Koo Kim  International Conference on Security and Management (SAM) 2009, pp.1-6
Conference 2009 USB Data Leakage Prevention Using Hardware based Data Inspection Technique   Dong Ho Kang  International Conference on Security and Management (SAM) 2009, pp.1-5
Conference 2009 Intelligent Pervasive Network Authentication: S/Key Based Device Authentication   Lee Deok Gyu  Consumer Communications and Networking Conference (CCNC) 2009, pp.1-5 5 원문
Conference 2008 Multiple-Aspect Malicious Code Detection for Component Survivability in Distributed Environments   Joon S. Park  IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS) 2008, pp.1-8
Conference 2008 Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network   Lee Deok Gyu  International Symposium on Ubiquitous Multimedia Computing (UMC) 2008, pp.99-104 3 원문
Conference 2008 Protection Profile for Security Enhancement of Embedded Operating System for Mobile Terminals   Jeong Youn Seo  International Conference on Advanced Communication Technology (ICACT) 2008, pp.1908-1911 2 원문
Conference 2007 Cooperative Component Testing Architecture in Collaborating Network Environment   An Gaeil  International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.179-190 5 원문
Conference 2007 Security Framework for Home Network: Authentication, Authorization, and Security Policy   Kim Geonwoo  Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2007 (LNCS 4819), v.4819, pp.621-628 7 원문
Conference 2006 Fragment Packet Partial Re-assembly Method for Intrusion Detection   Chung Bo-Heung  International Conference on Advanced Communication Technology (ICACT) 2006, pp.120-122 0
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2016 BEHAVIOR-BASED MALICIOUS CODE DETECTING APPARATUS AND METHOD USING MULTIPLE FEATURE VECTORS UNITED STATES
Registered 2016 다중 특징벡터를 이용하는 행위기반 악성코드 탐지 장치 및 방법 KOREA KIPRIS
Registered 2014 수집된 이벤트 정보 기반 악성코드 탐지 장치 및 방법 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.