Journal
|
2024 |
A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence
Jihyeon Song ICT EXPRESS, v.10, no.3, pp.632-649 |
5 |
원문
|
Journal
|
2022 |
Malware Detection Using Byte Streams of Different File Formats
정영섭 IEEE Access, v.10, pp.51041-51047 |
2 |
원문
|
Journal
|
2019 |
Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization
Kim Hyun Joo Cluster Computing, v.22, no.Supp.1, pp.921-929 |
52 |
원문
|
Conference
|
2017 |
Malware Detection using Malware Image and Deep Learning
Choi Sunoh International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1194-1196 |
32 |
원문
|
Conference
|
2016 |
Visualization of Malware Detection Based on API Call Sequence Alignment
Kim Jonghyun International Conference on Internet (ICONI) 2016, pp.175-178 |
|
|
Conference
|
2016 |
Implementation of Malware Detection System Based on Behavioral Sequences
Kim Hyun Joo International Conference on Security Technology (SecTech) 2016, pp.348-353 |
|
원문
|
Conference
|
2016 |
Development of Unidirectional Security Gateway Appliance using Intel 82580EB NIC Interface
Youngjun Heo International Conference on Information and Communication Technology Convergence (ICTC) 2016, pp.1194-1196 |
3 |
원문
|
Journal
|
2016 |
Host-based Intrusion Detection System for Secure Human-centric Computing
Moon Dae Sung Journal of Supercomputing, v.72, no.7, pp.2520-2536 |
35 |
원문
|
Journal
|
2016 |
Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call
Kim Hyun Joo IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080 |
6 |
원문
|
Journal
|
2015 |
Analyzing User Awareness of Privacy Data Leak in Mobile Applications
Young Ho Kim Mobile Information Systems, v.2015, pp.1-12 |
23 |
원문
|
Conference
|
2015 |
Cloud-Based Android Botnet Malware Detection System
Suyash Jadhav International Conference on Advanced Communication Technology (ICACT) 2015, pp.347-352 |
19 |
원문
|
Conference
|
2014 |
Analysis of Mobile Malware based on User Awareness
Young Ho Kim Conference on Research in Information Technology (RIIT) 2014, pp.51-51 |
0 |
원문
|
Conference
|
2014 |
Detection of SMS Mobile Malware
Yoon Seung Yong International Conference on Electronics, Information and Communication (ICEIC) 2014, pp.1-2 |
1 |
원문
|
Journal
|
2013 |
Mobile Malware Detection Using Correlational Analysis
Yoon Seung Yong International Journal of Advancements in Computing Technology, v.5, no.16, pp.52-58 |
|
|
Conference
|
2013 |
Malware Detection on Smartphones
Yoon Seung Yong International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.272-275 |
|
|
Conference
|
2013 |
Executable File Reconstruction on Virtualized Environment
Choi Yangseo International Conference on Computing and Convergence Technology (ICCCT) 2013, pp.264-267 |
|
|
Conference
|
2012 |
Network-based Executable File Extraction and Analysis for Malware Detection
Byoung Koo Kim International Conference on Security and Cryptography (SECRYPT) 2012, pp.430-433 |
|
|
Journal
|
2009 |
Encoded Executable File Detection Technique Via Executable File Header Analysis
Choi Yangseo International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36 |
|
|
Conference
|
2008 |
PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)
Choi Yangseo International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31 |
41 |
원문
|
Journal
|
2008 |
Executable Code Recognition in Network Flows Using Instruction Transition Probabilities
Kim Ik Kyun IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 |
2 |
원문
|