메뉴 건너뛰기




Volumn 19, Issue 1, 2016, Pages 263-268

A study of agent system model for response to spear-phishing

Author keywords

APT; End point Agent; Etc.; Security System Model; Spear phishing

Indexed keywords


EID: 84960410183     PISSN: 13434500     EISSN: 13448994     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (1)

References (11)
  • 2
    • 85015560484 scopus 로고    scopus 로고
    • A Study of Program Execution Control based on Whitelist
    • Chang-Hong Kim, Jeong-Hyun Yi, and Jong-Bae Kim. "A Study of Program Execution Control based on Whitelist ", KIICE, 20l4
    • (2014) KIICE
    • Kim, C.1    Yi, J.2    Kim, J.3
  • 3
    • 85015562492 scopus 로고    scopus 로고
    • A Study on Unknown Malware Detection using Digital Forensic Techniques
    • Jaeho Lee, Sangjin Lee. "A Study on Unknown Malware Detection using Digital Forensic Techniques ", CIST, 2014
    • (2014) CIST
    • Lee, J.1    Lee, S.2
  • 4
    • 84891446656 scopus 로고    scopus 로고
    • Malware detection method via major block comparison
    • Oct
    • TaeGuen Kim, In-Kyoung Kim, and Eul Gyu Im. "Malware detection method via major block comparison, "Journal of Security Engineering, 9(5), Oct. 2012.
    • (2012) Journal of Security Engineering , vol.9 , Issue.5
    • Kim, T.1    Kim, I.2    Gyu Im, E.3
  • 5
    • 84255172957 scopus 로고    scopus 로고
    • Malware family classification method using API sequential characteristic
    • Apr
    • Kyoung-Soo Han, In-Kyoung Kim, and Eul-Gyu Im. "Malware family classification method using API sequential characteristic, "Journal of Security Engineering, 8(2), pp. 319-335, Apr.2011.
    • (2011) Journal of Security Engineering , vol.8 , Issue.2 , pp. 319-335
    • Han, K.1    Kim, I.2    Im, E.3
  • 6
    • 74549138307 scopus 로고    scopus 로고
    • N-grams-based file signatures for malware detection
    • Igor Santos, Yoseba K. Penya, Jaime Devesa, and Pablo G. Bringas. "N-grams-based file signatures for malware detection, "ICEIS (2), 2009.
    • (2009) ICEIS , Issue.2
    • Santos, I.1    Penya, Y.K.2    Devesa, J.3    Bringas, P.G.4
  • 7
    • 84960377605 scopus 로고    scopus 로고
    • Detection method using common features of malware variants generated by automated tools
    • Sept
    • Seong-Bin Park, Min-Soo Kim, and Bong-Nam Noh. "Detection method using common features of malware variants generated by automated tools, "journal of Korean institute of information technology, 10(9), pp. 67-75, Sept. 2012.
    • (2012) Journal of Korean Institute of Information Technology , vol.10 , Issue.9 , pp. 67-75
    • Park, S.1    Kim, M.2    Noh, B.3
  • 8
    • 84960418400 scopus 로고    scopus 로고
    • Selecting features for measuring similarity between attack toolkits and polymorphic codes
    • Feb
    • Yong-Wook Chung and Bong-Nam Noh. "Selecting features for measuring similarity between attack toolkits and polymorphic codes, "Journal of Security Engineering, 9(1), Feb. 2012.
    • (2012) Journal of Security Engineering , vol.9 , Issue.1
    • Chung, Y.1    Noh, B.2
  • 9
    • 84960417391 scopus 로고    scopus 로고
    • Spear-Phishing Email: Most Favored APT Attack Bait
    • Trend micro, Spear-Phishing Email: Most Favored APT Attack Bait, http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spearphishing-email-most-favored-apt-attack-bait.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.