최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기멀티미디어학회논문지 = Journal of Korea Multimedia Society, v.23 no.5, 2020년, pp.650 - 657
박지현 (Dept. of Information Security, Seoul Women's University) , 김태옥 (Dept. of Information Security, Seoul Women's University) , 신유림 (Dept. of Information Security, Seoul Women's University) , 김지연 (Center for Software Educational Innovation and Right AI with Security & Ethics Research Center, Seoul Women's University) , 최은정 (Dept. of Information Security and Right AI with Security & Ethics Research Center, Seoul Women's University)
The rapid growth of internet users and faster network speed are driving the new ICT services. ICT Technology has improved our way of thinking and style of life, but it has created security problems such as malware, ransomware, and so on. Therefore, we should research against the increase of malware ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
McAfee Labs Threats Report, https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-aug-2019.pdf. (accessed January 6, 2020)
J. Kim, S. Hong, H. Kim, "A StyleGAN Image Detection Model Based on Convolutional Neural Network," Journal of Korea Multimedia Society, Vol. 22, No. 12, pp. 1447-1456, 2019
T. Kim, H. Ji, and E. Im, “Malware Classification Using Machine Learning and Binary Visualization,” Korean Institute of Information Scientists Engineers Transactions on Compution Practices, Vol. 24, No. 4, pp. 198-203, 2018.
K. Han, B. Kang, and E. Im, "Malware Analysis Using Visualized Image Matrices," The Scientific World Journal, Vol. 2014, Article ID. 132713, 2014.
Microsoft, Microsoft Malware Classification Challenge, https://www.kaggle.com/c/malwareclassification (accessed November 28, 2019).
S. Kang, N.V. Long, and S. Jung, “Android Malware Detection Using Permission-based Machine Learning Approach,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 28, No. 3, pp. 617-623, 2018.
D. Jo and D. Park, “Real-time Malware Detection Method Using Machine Learning,” The Journal of Korean Institute of Information Technology, Vol. 16, No. 3, pp. 101-113, 2018.
J. Bae, C. Lee, S. Choi, and J. Kim, “Malware Detection Model with Skip-connected LSTM RNN,” The Korean Institute of Information Scientists and Engineers, Vol. 45, No. 12, pp. 1233-1239, 2018.
L. Nataraj, S. Karthikeyan, G. Jacob, and B. S. Manjunath, "Malware Images: Visualization and Automatic Classification," Proceedings of the International Symposium on Visualization for Cyber Security, pp. 1-7, 2011.
W. Huang and J.W. Stokes, "MtNet: A Multi-Task Neural Network for Dynamic Malware Classification," Proceedings of Detection of Intrusions and Malware, and Vulnerability Assessment, Vol. 9721, pp. 399-418, 2016.
S. Jeong, H. Kim, Y. Kim, and M. Yoon, “Vgram: Malware Detection Using Opcode Basic Blocks and Deep Learning,” Journal of Korean Institute of Information Scientists and Engineers, Vol. 46, No. 7, pp. 599-605, 2019.
M.S. Charikar, "Similarity Estimation Techniques from Rounding Algorithms," Proceedings of the Thiry-fourth Annual ACM Symposium on Theory of Computing, pp. 380-388, 2002.
H. Kim, S. Han, S. Lee, and J. Lee, “Visualization of Malwares for Classification through Deep Learning,” Journal of Internet Computing and Services, Vol. 19, No. 5, pp. 67-75, 2018.
Anubis: Analyzing Unknown Binaries, https://www.virusbulletin.com/conference/vb 2009/abstracts/anubis-analyzing-unknown-binariesautomatic-way (accessed January 10, 2020).
K. Han, J. Lim, and E. Im, "Malware Analysis Method Using Visualization of Binary Files," Proceedings of the Research in Adaptive and Convergent Systems, pp. 317-321, 2013.
S. Ni, Q. Qian, and R. Zhang, "Malware Identification Using Visualization Images and Deep Learning," Computers and Security, Vol. 77, pp. 871-885, 2018.
J. Fu, J. Xue, Y. Wang, Z. Liu, and C. Shan, "Malware Visualization for Fine-grained Classification," IEEE Access, Vol. 6, pp. 14510-14523, 2018.
H. Seo, J. Choi, and P. Chu, “A Study on Windows Malicious Code Classification System,” Journal of the Korea Society for Simulation, Vol. 18, No. 1, pp. 63-70, 2009.
Y. Jeon, J. Oh, I. Kim, and J. Jang, “A Study on Internet Malware Classification Method and Detection Mechanism,” Korea Institute of Information Security and Cryptology Review, Vol. 18, No. 3, pp. 60-73, 2008.
E. Raff, J. Barker, J. Sylvester, R. Brandon, B. Catanzaro, and C. Nicholas, "Malware Detection by Eating a Whole EXE," Proceeding of American Association for Artificial Intelligence Workshop on AI for Cyber Security, pp. 268-276, 2018.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.