최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회지 = Communications of the Korean Institute of Information Scientists and Engineers, v.30 no.1, 2012년, pp.44 - 53
초록이 없습니다.
Intel Corporation, Intel 64 and IA-32 Architectures Software Developer's Manual Volume 2B: Instruction Set Reference, N-Z, Intel Corporation, March 2010.
김성우, 해캥/파괴의 광학(개정판), 와이미디어, 2006.
Trinius, P., Holz, T., Gobel, J. and Freiling, F. C., Visual Analysis of Mal ware Behavior using Treemaps and Thread Graphs, In International Workshop on Visualization for Cyber Security(VizSec), pp.33-38, 2009.
Fredrikson, M., Jha, S., Christodorescu, M., Sailer, R., Yan, X., Synthesizing Near-optimal Malware Specifications from Suspicious Behaviors, In Proc. of the 2010 IEEE Symp. on Security and Privacy, pp.45-60, 2010.
Xuxian Jiang, Dongyan Xu, Profiling Self-propagating Worms via Behavioral Footprinting, Proceedings of the 4th ACM Workshop on Recurring Malcode, November 2006.
S. Cesare and Y. Xiang, A Fast Flowgraph Based Classification System for Packed and Polymorphic Malware on the Endhost, Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, pp.721-728, April 2010.
Q. Zhang, and D. S. Reeves, MetaAware: Identifying Metamorphic Malware, Proceedings of the 23rd Annual Computer Security Applications Conference, pp.411- 420, September 2007.
R. Tian, L.M. Batten and S.C. Versteeg, Function Length as a Tool for Malware Classification, Proceedings of the 3rd International Conference on Malicious and Unwanted Software, pp.69-76, October 2008.
J. Lee, K. Jeong and H. Lee, Detecting Metamorphic Malwares using Code Graphs, Proceedings of the 2010 ACM Symposium on Applied Computing, pp.1970-1977, March 2010.
D. K. S. Reddy and A. K. Pujari, N-gram Analysis for Computer Virus Detection, Journal in Computer Virology, 2(3), pp.231-269, November 2006.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.