최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기산업융합연구 = Journal of industrial convergence, v.21 no.9, 2023년, pp.41 - 48
황윤철 (한남대학교 탈메이지 교양.융합대학)
Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for r...
H. S. Kim, & S. J. Lee. (2023). Comparative?analysis of effective feature extraction techniques?for machine learning-based ransomware attack?detection. Journal of Convergence Security,?23(1), 117-123.
K. W. Moon, J. H. Lee. (2022). Recent Ransomware?Trends and Development Direction. Journal of?Information Security Society, 32(3), 33-39.
K.W. Moon, J. H. Lee (2018). Analysis of latest?ransomware features. Journal of the Korean?Society of Communications and Communications,?43(4), 715-722.?DOI : 10.7840/kics.2018.43.4.715
H. S. Kim, I. S. Kim. (2019). Malicious code?distribution site characteristics analysis and?countermeasures study. Journal of the Information Security Society, 29(1), 93-103.
D. J. Jeon, & D. G. Park. (2018). Real-time?malicious file detection technique using machine?learning technique. Journal of the Korean?Society of Information Technology, 16(3), 101-113.
Y. S. Lee, J. W. Lee, N. Y. Rae, S. J. Jung, K?Seong, & W. Y So. (2018, June). Malicious code?detection method trend analysis using deep?learning. In Proceedings of KIIT Conference?(pp. 166-169).
IBM Security X-Force Threat Intelligence Index?(accessed January 6, 2023), https://www.ibm.com/reports/threat-intelligence
H. M. Nam, J. S. Jang, & Y. H. Jeon. (2016).?Research on analysis of ransomware attack?techniques and countermeasures. Proceedings?of the Korea Internet Information Society?Conference, 17(1), 283-284.
Chandrashekar, G., & Sahin, F. (2014). A survey?on feature selection methods. Computers &?Electrical Engineering, 40(1), 16-28.
K. H. Lee, M. C. Hwang, Y. I. Koo, D. Y. Hyun,?& Y. Y. Yoo. (2022). A study on a ransomware?detection model using opcode and API clustering?and similarity analysis. Korean Information?Processing Society Conference Proceedings,?29(1), 179-182.
Murtagh, F., & Contreras, P. (2017). Algorithms?for hierarchical clustering: an overview, II.?Wiley Interdisciplinary Reviews: Data Mining?and Knowledge Discovery, 7(6), e1219.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.