Automatic Malware Detection Rule Generation and Verification System
Sungho Kim, Suchul Lee, Journal of Internet Computing and Services, Vol. 20, No. 2, pp. 9-19, Apr. 2019
10.7472/jksii.2019.20.2.9, Full Text:
Keywords: Malware, Detection rule, SNORT, LDA, network threat
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Kim, S. & Lee, S. (2019). Automatic Malware Detection Rule Generation and Verification System. Journal of Internet Computing and Services, 20(2), 9-19. DOI: 10.7472/jksii.2019.20.2.9.
[IEEE Style]
S. Kim and S. Lee, "Automatic Malware Detection Rule Generation and Verification System," Journal of Internet Computing and Services, vol. 20, no. 2, pp. 9-19, 2019. DOI: 10.7472/jksii.2019.20.2.9.
[ACM Style]
Sungho Kim and Suchul Lee. 2019. Automatic Malware Detection Rule Generation and Verification System. Journal of Internet Computing and Services, 20, 2, (2019), 9-19. DOI: 10.7472/jksii.2019.20.2.9.