최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기융합정보논문지 = Journal of Convergence for Information Technology, v.11 no.4, 2021년, pp.55 - 63
최도현 (숭실대학교 컴퓨터학과) , 박중오 (성결대학교 파이데이아학부)
Recently, the incidence rate of malicious codes is over tens of thousands of cases, and it is known that it is almost impossible to detect/respond all of them. This study proposes a method for detecting multiple behavior patterns based on a graph database as a new method for dealing with malicious c...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
ESTsecurity. (n. d.). ESTsecurity. Eastsecurity Security Trend Report No.136. 2021-01 - Malicious Code Statistics and Analysis(Online). https://www.estsecurity.com/
KISA. (n. d.). Korea Internet & Security Agency. Malicious Code Hidden Site Detection Trend Report [First Half of 20](Online). https://www.boho.or.kr/
K. W. Kook & B. C. Gong. (n. d.). ITFIND. Trends in Security Technology Development Using Artificial Intelligence - Planning Series (Next Generation Security)(Online). https://www.itfind.or.kr/
ESTsecurity. (n. d.). ESTsecurity. ESTsecurity Security Trend Report No.137. 2021-02 - Malicious Code Statistics and Analysis(Online). https://www.estsecurity.com/
IDG - CIO Korea. (n. d.). Gartner, Announcement of Top 10 Data and Analysis Technology Trends in 2019 - Trend 5 : Grape(Online). https://www.ciokorea.com/
J. S. Seo & H. J. Lee. (n. d.). Bitnine.. Graph Database Technology Trends and Application Cases(Online). https://www.itfind.or.kr/
AMAZON. (n. d.). Amazon Web Services. What Is a Graph Database? - The graph database defined(Online). https://aws.amazon.com/
Bitnine. (n. d.). AgensGraph Use Case #8. Collaboration/Performance Management System(Online). https://bitnine.net/
S. C. Sin. (2017). Static Code Analysis based on Graph Database. Communications of the Korean Institute of Information Scientists and Engineers, 35(2), 9-13. UCI(KEPA) : I410-ECN-0101-2017-569-002204936
D. H. Han & M. S. Kim. (2020). A Matrix Computation Engine and Applications based on Distributed GPUs for Large-scale Machine Learning. Journal of Computing Science and Engineering, 38(8), 8-17.
T. R. Kim & J. J. Lee. (2020). A Study on the Structure of Muga by Ontology Method - Focusing on -. Korean Folklore Society, 72, 333-369. DOI : 10.21318/TKF.2020.11.72.333
J. Y. Kim & K. H. Ro. (2019). Construction of Knowledge Base Based on Graph Database for College Student Career Advice Using Public Data. Journal of the Institute of Electronics and Information Engineers of Korea. 56(10), 41-48. DOI : 10.5573/ieie.2019.56.10.41
RTInsights. (n. d.). Todd Blaschka and Gaurav Deshpande, How the World's Largest Banks Use Advanced Graph Analytics to Fight Fraud(Online). https://www.rtinsights.com
William Lyon. (n. d.). Graph Visualization of Panama Papers Data In Neo4j - Revisiting ICIJ's Offshore Leaks In The Face Of The Latest Deutsche Bank Scandal (Online). https://medium.com/
INCA Internet Security Analysis & Response Center. (n. d.). October 2020 Malware Statistics(Online). https://www.estsecurity.com/
dyaniworld. (n. d.). Information Technology/Spear Phishing - A Study on Behavior-Based Discrimination for Spear Phishing(Online). https://dyaniworld.tistory.com/
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.