최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.10 no.2, 2021년, pp.39 - 46
이덕규 (서원대학교 정보보안학과)
Damages by malware have recently been increasing. Conventional signature-based antivirus solutions are helplessly vulnerable to unprecedented new threats such as Zero-day attack and ransomware. Despite that, many enterprises have retained signature-based antivirus solutions as part of the multiple e...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Why even the best antivirus software isn't enough (and why you still need it) [Internet], https://www.csoonline.com/article/3316480/why-the-best-antivirus-software-isnt-enough.html
G. S. Kang, "Study on Cloud Computing-Based Malware Detection System," Master, Konkuk University, Korea, 2015.
S. Y. Choi, "Emulation-Based Abnormal Web Page Link Analysis to Detect Malware-istributing Networks," Master, Jeonnam National University, Korea, 2014.
Symantech - Internet Security Thresat Report [Internet], https://docs.broadcom.com/docs/istr-24-executive-summary-en
A. Souri and R. Hosseini, "A state-of-the-art survey of malware detection approaches using data mining techniques," Humand-centric Computing and Information Sciences, Vol.8, No.3, 2018.
A. Douglas, R. Holloway, J. Lohr, E. Morgan, and K. Harfoush, "Blockchains for constrained edge devices," Blockchain: Research and Applications, Vol.1, Iss.1-2, 2020.
S. W. Kim, "Real-Time Malware Detection in Intrusion Detection System," Master, Hanyang University, Korea, 2014.
J. W. Chang, "Study on Detecting Malware and Security Control Measures," Master, Korea University, 2014.
J. H. Park, "Effect of Private Blockchain Characteristics on Acceptance in Medical Sector," Master, Graduate School of Sungkyunkwan University, Korea, 2018.
G. Y. Lee, "Study of Applying Blockchain Technology and Record Management System," Master, Myongji University, Korea, 2019.
P. S. Goh, "Study on Use of Medical Information System with Blockchain," Master, Soongsil University, Korea, 2019.
D. G. Guh, "Study on Predicting Taxi Passenger Using Deep Learning," Master, University of Seoul, Korea, 2018.
D. T. Ramotsoela, G. P. Hancke, and A. M. Abu-Mahfouz, "Attack detection in water distribution systems using machine learning," Human-centric Computing and Information Sciences, Vol.9, No.13, 2019.
S. D. You, C. H. Liu, and W. K. Chen,"Comparative study of singing voice detection based on deep neural networks and ensemble learning," Human-centric Computing and Information Sciences, Vol.8, No.34, 2018.
S. N. Danilin and S. A. Shchanikov, "Neural network algorithms for determining the values of signal parameters in radio- electronic hardware," 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics), Omsk, 2017, pp.1-4, 2017.
Y. B. Cho, "Detection Technique of Malware Using Deep Learning-Based R-CNN," Master, Daejeon University, Korea, 2018.
Y. Cheong, "Blockchain-Based Image Information Management System," Master, Ajou University, Korea, 2019.
S. I. Jung and H. W. Kim, "Web-Anti-MalWare Malware Detection System," Proceedings of the Korean Society of Computer Information Conference, pp.365-367, 2014.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.