-
2
-
-
85015560484
-
A Study of Program Execution Control based on Whitelist
-
Chang-Hong Kim, Jeong-Hyun Yi, and Jong-Bae Kim. "A Study of Program Execution Control based on Whitelist ", KIICE, 20l4
-
(2014)
KIICE
-
-
Kim, C.1
Yi, J.2
Kim, J.3
-
3
-
-
85015562492
-
A Study on Unknown Malware Detection using Digital Forensic Techniques
-
Jaeho Lee, Sangjin Lee. "A Study on Unknown Malware Detection using Digital Forensic Techniques ", CIST, 2014
-
(2014)
CIST
-
-
Lee, J.1
Lee, S.2
-
4
-
-
84891446656
-
Malware detection method via major block comparison
-
Oct
-
TaeGuen Kim, In-Kyoung Kim, and Eul Gyu Im. "Malware detection method via major block comparison, "Journal of Security Engineering, 9(5), Oct. 2012.
-
(2012)
Journal of Security Engineering
, vol.9
, Issue.5
-
-
Kim, T.1
Kim, I.2
Gyu Im, E.3
-
5
-
-
84255172957
-
Malware family classification method using API sequential characteristic
-
Apr
-
Kyoung-Soo Han, In-Kyoung Kim, and Eul-Gyu Im. "Malware family classification method using API sequential characteristic, "Journal of Security Engineering, 8(2), pp. 319-335, Apr.2011.
-
(2011)
Journal of Security Engineering
, vol.8
, Issue.2
, pp. 319-335
-
-
Han, K.1
Kim, I.2
Im, E.3
-
6
-
-
74549138307
-
N-grams-based file signatures for malware detection
-
Igor Santos, Yoseba K. Penya, Jaime Devesa, and Pablo G. Bringas. "N-grams-based file signatures for malware detection, "ICEIS (2), 2009.
-
(2009)
ICEIS
, Issue.2
-
-
Santos, I.1
Penya, Y.K.2
Devesa, J.3
Bringas, P.G.4
-
7
-
-
84960377605
-
Detection method using common features of malware variants generated by automated tools
-
Sept
-
Seong-Bin Park, Min-Soo Kim, and Bong-Nam Noh. "Detection method using common features of malware variants generated by automated tools, "journal of Korean institute of information technology, 10(9), pp. 67-75, Sept. 2012.
-
(2012)
Journal of Korean Institute of Information Technology
, vol.10
, Issue.9
, pp. 67-75
-
-
Park, S.1
Kim, M.2
Noh, B.3
-
8
-
-
84960418400
-
Selecting features for measuring similarity between attack toolkits and polymorphic codes
-
Feb
-
Yong-Wook Chung and Bong-Nam Noh. "Selecting features for measuring similarity between attack toolkits and polymorphic codes, "Journal of Security Engineering, 9(1), Feb. 2012.
-
(2012)
Journal of Security Engineering
, vol.9
, Issue.1
-
-
Chung, Y.1
Noh, B.2
-
9
-
-
84960417391
-
-
Spear-Phishing Email: Most Favored APT Attack Bait
-
Trend micro, Spear-Phishing Email: Most Favored APT Attack Bait, http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-spearphishing-email-most-favored-apt-attack-bait.pdf
-
-
-
|