Automatic Malware Detection Rule Generation and Verification System
Sungho Kim, Suchul Lee, Journal of Internet Computing and Services, Vol. 20, No. 2, pp. 9-19, Apr. 2019
Keywords: Malware, Detection rule, SNORT, LDA, network threat
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Kim, S. & Lee, S. (2019). Automatic Malware Detection Rule Generation and Verification System. Journal of Internet Computing and Services, 20(2), 9-19. DOI: 10.7472/jksii.2019.20.2.9.
[IEEE Style]
S. Kim and S. Lee, "Automatic Malware Detection Rule Generation and Verification System," Journal of Internet Computing and Services, vol. 20, no. 2, pp. 9-19, 2019. DOI: 10.7472/jksii.2019.20.2.9.
[ACM Style]
Sungho Kim and Suchul Lee. 2019. Automatic Malware Detection Rule Generation and Verification System. Journal of Internet Computing and Services, 20, 2, (2019), 9-19. DOI: 10.7472/jksii.2019.20.2.9.

