최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기The journal of the institute of internet, broadcasting and communication : JIIBC, v.20 no.2, 2020년, pp.39 - 44
최현웅 (한성대학교 컴퓨터공학부) , 허준영 (한성대학교 컴퓨터공학부)
Malicious codes cause damage to equipments while avoiding detection programs(vaccines). The reason why it is difficult to detect such these new malwares using the existing vaccines is that they use "signature-based" detection techniques. these techniques effectively detect already known malicious co...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Tversky, Amos, and Daniel Kahneman. "Judgment under uncertainty: Heuristics and biases." science 185.4157, pp.1124-1131, 1974. DOI: https://doi.org/10.1126/science.185.4157.1124
Damodaran, Anusha, et al. "A comparison of static, dynamic, and hybrid analysis for malware detection." Journal of Computer Virology and Hacking Techniques 13.1, : pp.1-12, 2017 DOI: https://doi.org/10.1007/s11416-015-0261-z
Hardy, William, et al. "DL4MD: A deep learning framework for intelligent malware detection." Proceedings of the International Conference on Data Mining (DMIN). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2016.
Schmidt, A-D. et al. "Static analysis of executables for collaborative malware detection on android." 2009 IEEE International Conference on Communications. IEEE, 2009. DOI: https://doi.org/10.1109/ICC.2009.5199486
Sheen, Shina, R. Anitha, and V. Natarajan. "Android based malware detection using a multifeature collaborative decision fusion approach." Neurocomputing 151 : pp.905-912, 2015 DOI: https://doi.org/10.1016/j.neucom.2014.10.004
Alazab, Mamoun, Sitalakshmi Venkataraman, and Paul Watters. "Towards understanding malware behaviour by the extraction of API calls." 2010 Second Cybercrime and Trustworthy Computing Workshop. IEEE, 2010. DOI: https://doi.org/10.1109/CTC.2010.8
Santos, Igor, et al. "Opcode sequences as representation of executables for data-mining-based unknown malware detection." Information Sciences 231, pp.64-82. 2013 DOI: https://doi.org/10.1016/j.ins.2011.08.020
Li, Yuancheng, Rong Ma, and Runhai Jiao. "A hybrid malicious code detection method based on deep learning." International Journal of Security and Its Applications 9.5, pp.205-216, 2015 DOI: http://dx.doi.org/10.14257/ijsia.2015.9.5.21
Kim, Hyeonggyeom, et al. "Visualization of Malwares for Classification Through Deep Learning." Journal of Internet Computing and Services 19.5, pp.67-75, 2018. DOI: https://doi.org/10.7472/jksii.2018.19.5.67
Masci, Jonathan, et al. "Stacked convolutional auto-encoders for hierarchical feature extraction." International conference on artificial neural networks. Springer, Berlin, Heidelberg, 2011. DOI: https://doi.org/10.1007/978-3-642-21735-7_7
Du, Bo, et al. "Stacked convolutional denoising auto-encoders for feature representation." IEEE transactions on cybernetics 47.4, pp.1017-1027, 2016. DOI: https://doi.org/10.1109/TCYB.2016.2536638
Vincent, Pascal, et al. "Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion." Journal of machine learning research 11.Dec, pp. 3371-3408, 2010.
Makhzani, Alireza, and Brendan J. Frey. "Winner-take-all autoencoders." Advances in neural information processing systems. 2015.
Baumberg, Adam. "Reliable feature matching across widely separated views." Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No. PR00662). Vol. 1. IEEE, 2000. DOI: https://doi.org/10.1109/CVPR.2000.855899
Kim, Jang-Il, Hee-Seok Lee, and Yong-Gyu Jung. "Malware Behavior Analysis based on Mobile Virtualization." The Journal of The Institute of Internet, Broadcasting and Communication 15.2, pp. 1-7, 2015. DOI: https://doi.org/10.7236/JIIBC.2015.15.2.1
Lee, Yong-Joon, and Chang-Beom Lee. "A Malware Detection Method using Analysis of Malicious Script Patterns." Journal of the Korea Academia-Industrial cooperation Society 20.7, pp. 613-621, 2019. DOI: https://doi.org/10.5762/KAIS.2019.20.7.613
Jeon, Deok-jo, and Park, Dong-Gue. "Real-time Linux Malware Detection Using Machine Learning." The Journal of Korean Institute of Information Technology, Vol. 17, No. 7, pp.111-122, 2019. DOI: https://doi.org/10.14801/jkiit.2019.17.7.111
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.