• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: "[ keyword: 악성코드 ]" (5)
  1. 1. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  2. 2. Research on text mining based malware analysis technology using string information
    Ji-hee Ha, Tae-jin Lee, Vol. 21, No. 1, pp. 45-55, Feb. 2020
    10.7472/jksii.2020.21.1.45
    Keywords: Malware, Malware analysis, String, Text Mining, TFIDF
  3. 3. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  4. 4. Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints
    Jun-ho Hwang, Seon-bin Hwang, Su-jeong Kim, Tae-jin Lee, Vol. 19, No. 5, pp. 21-31, Oct. 2018
    10.7472/jksii.2018.19.5.21
    Keywords: Malware, Static Analysis, deep neural network
  5. 5. An automatic detection scheme of anti-debugging routines to the environment for analysis
    Jin-Woo Park, Yong-Su Park, Vol. 15, No. 6, pp. 47-54, Dec. 2014
    10.7472/jksii.2014.15.6.47
    Keywords: Anti-debugging, Malware, Instruction trace, API trace, Anti-reversing, Anti-reverse Engineering