최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기전기전자학회논문지 = Journal of IKEEE, v.25 no.4, 2021년, pp.672 - 678
New malware continues to increase and become advanced by every year. Although various studies are going on executable files to diagnose malicious codes, it is difficult to detect attacks that internalize malicious code threats in emails by exploiting non-executable document files, malicious URLs, an...
"Malware Statistics & Trends Report," https://www.av-test.org/en/statistics/malware/
Lenny Zeltser, "Information Security in Businesses," https://zeltser.com/mastering-4-stages-of-malware-analysis/
"Kubeflow," https://www.kubeflow.org/
"Virus Total," https://www.virustotal.com/gui/home/upload
J. Kinable and O. Kostakis, "Malware classication based on call graph clustering," Journal in Computer Virology, vol.7, no.4, pp.233-245, 2011. DOI: 10.1007/s11416-011-0151-y
M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario, "Automated classification and analysis of internet malware," Recent Advances in Intrusion Detection (C. Kruegel, R. Lippmann, and A. Clark, eds.), vol. 4637 of Lecture Notes in Computer Science, pp.178-197, 2007. DOI: 10.1007/978-3-540-74320-0_10
R. Islam, R. Tian, L. M. Batten, and S. Versteeg, "Classification of malware based on integrated static and dynamic features," Journal of Network and Computer Applications, vol.36, no.2, pp.646-656, 2013. DOI: 10.1016/j.jnca.2012.10.004
M. Sokolova and G. Lapalme, "A system atic analysis of performance measures for classification tasks," Information Processing & Management, vol.45, no.4, pp.427-437, 2009. DOI: 10.1016/j.ipm.2009.03.002
※ AI-Helper는 부적절한 답변을 할 수 있습니다.