최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.23 no.1, 2022년, pp.87 - 93
박광연 (Cyber Warfare(Integrated course), Korea National Defense Univ.) , 이수진 (Dept. of National Defense Science, Korea National Defnese Univ.)
Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detectio...
KISA, "2021 First Half KISA Cyber Security Issue Report", 2021. https://www.krcert.or.kr/filedownload.do?attach_file_seq3431&attach_file_idEpF3431.pdf
Shim Seung-bae, "Military introduction direction and tasks of Open O.S", 33rd SPRi Forum, 2017. https://spri.kr/download/21770
Mcafee, "Mcafee ATR Threats Report 4.21", 2021. https://www.mcafee.com/enterprise/en-us/lp/threats-repor ts/apr-2021.html
Clarence Chio, David Freeman, "Machine Learning and Security", pp. 175, O'Reilly Media, Inc., 2018.
R. Kath, "The Portable Executable File Format from Top to Bottom", MSDN Libary, Microsoft Corporation, 1993. http://www.csn.ul.ie/~caolan/pub/winresdump/winresdump/doc/pefile2.html
S. Hocheriter, J. Schmidhuber, "Long short-term memory", Nneurl computation 9, no. 8, pp. 1735-1780, 1997. http://dx.doi.org/10.1162/neco.1997.9.8.1735
Yukinaga Azuma, "Introduction to core deep learning", onlybook, 2020.
J. Saxe, H. Sanders, "Malware Data Science", Youngjin, 2020.
Mike Schuster, Kuldip K. Paliwal, "Bidirectional Recurrent Neural Networks", IEEE Transactions on signal processing, Vol. 45, No. 11, 1997. http://dx.doi.org/10.1109/78.650093
Yunseok Rhee, "Malicious Code Detection Method Using LSTM Learning on the File Access Behavior", The Journal of Korean Institute of Information Technology, Vol.18, no. 2, pp.25-32, 2020. http://dx.doi.org/10.14801/jkiit.2020.18.2.25
H. S. Anderson, P. Roth, "EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models", arXiv preprint arXiv:1804.04637, 2018. https://arxiv.org/abs/1804.04637v2
S. Parmanik, H. Teja, "EMBER - Analysis of Malware Dataset Using Convolutional Neural Networks", 2019 3rd International Conference on Inventive Systems and Control(ICISC), pp. 286-291, 2019. http://dx.doi.org/9/ICISC44355.2019.9036424
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.