• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: "[ keyword: Malware ]" (8)
  1. 1. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  2. 2. Research on text mining based malware analysis technology using string information
    Ji-hee Ha, Tae-jin Lee, Vol. 21, No. 1, pp. 45-55, Feb. 2020
    10.7472/jksii.2020.21.1.45
    Keywords: Malware, Malware analysis, String, Text Mining, TFIDF
  3. 3. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  4. 4. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  5. 5. Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints
    Jun-ho Hwang, Seon-bin Hwang, Su-jeong Kim, Tae-jin Lee, Vol. 19, No. 5, pp. 21-31, Oct. 2018
    10.7472/jksii.2018.19.5.21
    Keywords: Malware, Static Analysis, deep neural network
  6. 6. Method to Analyze Information Leakage Malware using SSL Communication in Android Platform
    Gilsu Cho, Sangwho Kim, Jaecheol Ryou, Vol. 19, No. 3, pp. 1-6, Jun. 2018
    10.7472/jksii.2018.19.3.1
    Keywords: Android, Information leakage, network packet monitoring, SSL, Malware
  7. 7. Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform
  8. 8. An automatic detection scheme of anti-debugging routines to the environment for analysis
    Jin-Woo Park, Yong-Su Park, Vol. 15, No. 6, pp. 47-54, Dec. 2014
    10.7472/jksii.2014.15.6.47
    Keywords: Anti-debugging, Malware, Instruction trace, API trace, Anti-reversing, Anti-reverse Engineering