• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 악성코드 ]" (7)
  1. 1. Bidirectional LSTM based light-weighted malware detection modelusing Windows PE format binary data
    Kwang-Yun PARK, Soo-Jin LEE, Vol. 23, No. 1, pp. 87-93, Feb. 2022
    10.7472/jksii.2022.23.1.87
    Keywords: Bidirectional LSTM, Windows PE malware, Detection, EMBER2018
  2. 2. A Study on Classification of Variant Malware Family Based on ResNet-Variational AutoEncoder
    Young-jeon Lee, Myung-Mook Han, Vol. 22, No. 2, pp. 1-9, Apr. 2021
    10.7472/jksii.2021.22.2.1
    Keywords: Variant Malware, Malware classification, Variational AutoEncoder, Tranfer Learning, Ensemble learning
  3. 3. The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification
    Gun-Yoon Shin, Dong-Wook Kim, Myung-Mook Han, Vol. 21, No. 2, pp. 1-8, Apr. 2020
    10.7472/jksii.2020.21.2.1
    Keywords: Authorship Attribution, Attacker Group, genetic algorithm, Malware, Authorship Clustering
  4. 4. Research on text mining based malware analysis technology using string information
    Ji-hee Ha, Tae-jin Lee, Vol. 21, No. 1, pp. 45-55, Feb. 2020
    10.7472/jksii.2020.21.1.45
    Keywords: Malware, Malware analysis, String, Text Mining, TFIDF
  5. 5. Automatic Malware Detection Rule Generation and Verification System
    Sungho Kim, Suchul Lee, Vol. 20, No. 2, pp. 9-19, Apr. 2019
    10.7472/jksii.2019.20.2.9
    Keywords: Malware, Detection rule, SNORT, LDA, network threat
  6. 6. Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints
    Jun-ho Hwang, Seon-bin Hwang, Su-jeong Kim, Tae-jin Lee, Vol. 19, No. 5, pp. 21-31, Oct. 2018
    10.7472/jksii.2018.19.5.21
    Keywords: Malware, Static Analysis, deep neural network
  7. 7. An automatic detection scheme of anti-debugging routines to the environment for analysis
    Jin-Woo Park, Yong-Su Park, Vol. 15, No. 6, pp. 47-54, Dec. 2014
    10.7472/jksii.2014.15.6.47
    Keywords: Anti-debugging, Malware, Instruction trace, API trace, Anti-reversing, Anti-reverse Engineering