최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.32 no.5, 2022년, pp.1019 - 1034
신경아 (고려대학교 정보보호대학원) , 이윤호 ((주)에프원시큐리티) , 배병주 ((주)에프원시큐리티) , 이수항 ((주)에프원시큐리티) , 홍희주 ((주)에프원시큐리티) , 최영진 ((주)에프원시큐리티) , 이상진 (고려대학교 정보보호대학원)
Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without col...
Gibert, D., Mateu, C., & Planes, J., "The rise of machine learning for detection and classification of malware: Research developments, trends and challenges," Journal of Network and Computer Applications, vol. 153, pp. 102526, Jan. 2020.
K. P. Briefing, "Trusted artificial intelligence realization strategy," https://www.msit.go.kr/bbs/view.do?sCodeuser&mId113&mPid112&pageIndex&bbsSeqNo94&nttSeqNo3180239&searchOptALL&searchTxt,Sep. 2022.
C. P. SungIk Jo, WoongSikYoo,"Implementation strategies formachine learning operations (mlops)," Institute for Information&communication Technology Planning& evaluation (IITP), 1985(1), pp.2-16, Feb, 2021.
Kang, B., Yerima, S. Y., Sezer, S., &McLaughlin, K., "N-gram opcode analysis for android malware detection," arXiv preprintarXiv:1612.01445. 2016.
Santos, I., Brezo, F., Ugarte-Pedrero,X., & Bringas, P. G., "Opcode sequences as representation of executables for data-mining-based unknown malware detection," Information Sciences, vol. 231, pp.64-82, May. 2013.
Saxe, J., & Berlin, K., "Deepneural network based malware detectionusing two dimensional binary programfeatures," In 2015 10th International Conference on Malicious and Unwanted Software (MALWARE), pp.11-20, Oct. 2015.
Shabtai, A., Moskovitch, R., Feher,C., Dolev, S., & Elovici, Y.,"Detecting unknown malicious codebyapplying classification techniques on opcode patterns," Security Informatics, vol. 1, no. 1, pp. 1-22,Feb. 2012.
Kumar, N., Mukhopadhyay, S.,Gupta, M., Handa, A., & Shukla, S.,"Malware Classification using Early Stage Behavioral Analysis," IEEE Conference Publication I IEEE Xplore., pp. 16-23, Aug. 2019.
Han, W., Xue, J., Wang, Y., Huang, L., Kong, Z., & Mao, L., "MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics," Computers & Security, vol. 83, pp. 208-233, Jun. 2019.
Fuyong, Z., & Tiezhu, Z., "Malware detection and classification based on n-grams attribute similarity," In 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol. 1, pp. 793-796, Jul. 2017.
Mikolov, T., Chen, K., Corrado, G., & Dean, J., "Efficient estimation of word representations in vector space," arXiv preprint arXiv:1301.3781, 2013.
Pascanu, R., Stokes, J. W., Sanossian, H., Marinescu, M., & Thomas, A, "Malware classification with recurrent networks," In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1916-1920, Apr. 2015.
Hardy, W., Chen, L., Hou, S., Ye, Y., & Li, X., "DL4MD: A deep learning framework for intelligent malware detection," In Proceedings of the International Conference on Data Science (ICDATA). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), pp. 61-67, 2016.
Jung, B., Kim, T., & Im, E. G., "Malware classification using byte sequence information," In Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, pp. 143-148, Oct. 2018.
Gibert, D., "Convolutional neural networks for malware classification," University Rovira i Virgili, Tarragona, Spain, pp. 1-98, Oct. 2016.
Kolosnjaji, B., Eraisha, G., Webster,G., Zarras, A., &Eckert, C,"Empowering convolutional networks for malware classification and analysis," In 2017 International Joint Conference on Neural Networks(IJCNN), pp. 3838-3845, May. 2017.
Raff, E., Barker, J., Sylvester, J.,Brandon, R., Catanzaro, B., Nicholas, C. K., "Malware detection by eatingawhole exe," In Workshops at the Thirty-Second AAAI Conferenceon Artificial Intelligence, pp. 268-276,Jun. 2018.
"Word2vec: Google's NewLeapForward on the Vectorized Representation of Words," Medium,2. Jun. 2018.
Le, Q., Boydell, O., Mac Namee, B.,& Scanlon, M, "Deep learning at theshallow end: Malware classificationfor non-domain experts," Digital Investigation, vol.26, pp. S118-S126,Jul. 2018.
Trong Duc Nguyen, Anh Tuan Nguyen, Hung Dang Phan, and Tien N Nguyen, "Exploring apiembedding for apiusages and applications," In2017 IEEE/ACM 39th International Conference on Software Engineering(ICSE), pp. 438-449, Jul. 2017.
Lee, Y., Kwon, H., Choi, S. H., Lim,S. H., Baek, S. H., & Park, K. W.,"Instruction 2vec: efficient preprocessor of assembly code to detect software weakness with CNN," Applied Sciences, vol. 9, no. 19, pp. 4086, Sep. 2019.
Cho, S., Yoo, W., Pyo, C., "Machine Learning Operations (MLOps) Implementation Strategy," https://kosen.kr/file/down/FILE_000000000051750/1, IITP, weekly tech trend, pp.2-16, Feb. 2021.
KIAT[Agile], "Driving innovation in AI development, what is 'mlops'?" https://www.kiat.or.kr/commonfile/fileidDownLoad.do?file_id58516, Aug. 2022.
S. Poudyal and D. Dasgupta, "Ai-powered ransomware detection framework," in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1154-1161, Dec. 2020.
O. Aslan and A. A. Yilmaz, "A new malware classification framework based on deep learning algorithms," Ieee Access, vol. 9, pp. 87936-87951, Jun. 2021.
C. Urcuqui-Lopez and A. N. Cadavid, "Framework for malware analysis in android," Sistemas y Telematica, vol. 14, no. 37, pp. 45-56, Aug. 2016.
L. Caviglione, M. Gaggero, J.-F. Lalande, W. Mazurczyk, and M. Urbanski, "Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence," IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 799-810, Dec. 2015
Virusshare, "Forensics, C.: Virusshare",https://virusshare.com/, Sep. 2022.
VirsuTotal, "Virustotal.com", https://www.virustotal.com/, Sep. 2022.
Khalid, S., Khalil, T., &Nasreen, S.,"A survey of feature selection and feature extraction techniquesinmachine learning," In 2014 science and information conference, pp.372-378, Aug. 2014.
Peng, H., Long, F., &Ding, C.,"Feature selection based onmutual information criteria of max-dependency, max-relevance, andmin-redundancy," IEEE Transactionson pattern analysis and machineintelligence, vol. 27, no. 8, pp.1226-1238, Jun. 2005.
A. B. Arrieta, N. Diaz-Rodriguez, J.Del Ser, A. Bennetot, S. Tabik, A.Barbado, S. Garcia, S. Gil-Lopez, D.Molina, R. Benjamins, et al.,"Explainable artificial intelligence(xai): Concepts, taxonomies, opportunities and challenges towardresponsible ai," Information fusion,vol. 58, pp. 82-115, Jan. 2020.
Lim, H., Kim, S., "The needandresearch trends for explainableAI(XAI)," Journal of Information Technology and Applied Engineering(JITAE), 12(1), pp. 51-57, Apr. 2022.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.