• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Malware ]" (11)
  1. 1. A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments
    Donghyun Kim, Jiho Shin, Jung Taek Seo, Vol. 24, No. 1, pp. 17-26, Feb. 2023
    10.7472/jksii.2023.24.1.17
    Keywords: Smart City, Internet of Things, Malware, Massive IoT, MITRE ATT&CK
  2. 2. Bidirectional LSTM based light-weighted malware detection modelusing Windows PE format binary data
    Kwang-Yun PARK, Soo-Jin LEE, Vol. 23, No. 1, pp. 87-93, Feb. 2022
    10.7472/jksii.2022.23.1.87
    Keywords: Bidirectional LSTM, Windows PE malware, Detection, EMBER2018
  3. 3. A Study on Classification of Variant Malware Family Based on ResNet-Variational AutoEncoder
    Young-jeon Lee, Myung-Mook Han, Vol. 22, No. 2, pp. 1-9, Apr. 2021
    10.7472/jksii.2021.22.2.1
    Keywords: Variant Malware, Malware classification, Variational AutoEncoder, Tranfer Learning, Ensemble learning
  4. 4. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  5. 5. Research on text mining based malware analysis technology using string information
    Ji-hee Ha, Tae-jin Lee, Vol. 21, No. 1, pp. 45-55, Feb. 2020
    10.7472/jksii.2020.21.1.45
    Keywords: Malware, Malware analysis, String, Text Mining, TFIDF
  6. 6. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  7. 7. Visualization of Malwares for Classification Through Deep Learning
    Hyeonggyeom Kim, Seokmin Han, Suchul Lee, Jun-Rak Lee, Vol. 19, No. 5, pp. 67-75, Oct. 2018
    10.7472/jksii.2018.19.5.67
    Keywords: Malware visualization, mawlare detection and classification, Deep Learning, CNN
  8. 8. Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints
    Jun-ho Hwang, Seon-bin Hwang, Su-jeong Kim, Tae-jin Lee, Vol. 19, No. 5, pp. 21-31, Oct. 2018
    10.7472/jksii.2018.19.5.21
    Keywords: Malware, Static Analysis, deep neural network
  9. 9. Method to Analyze Information Leakage Malware using SSL Communication in Android Platform
    Gilsu Cho, Sangwho Kim, Jaecheol Ryou, Vol. 19, No. 3, pp. 1-6, Jun. 2018
    10.7472/jksii.2018.19.3.1
    Keywords: Android, Information leakage, network packet monitoring, SSL, Malware
  10. 10. Malware Application Classification based on Feature Extraction and Machine Learning for Malicious Behavior Analysis in Android Platform