Digital Library
Search: "[ keyword: CIO ]" (11)
-
Yue Zhang, Hyun-HoYang, Ning Gao, Vol. 21, No. 5, pp. 57-65, Oct. 2020
10.7472/jksii.2020.21.5.57
Keywords: Malicious Executable Detection, Transfer Learning, Feature-Based -
Sumin Hwang, Hyung-Woo Lee, Vol. 20, No. 2, pp. 61-68, Apr. 2019
10.7472/jksii.2019.20.2.61
Keywords: Blockchain, Hyperledger Fabric, Android Mobile App, Malicious Counterfeit App Detection. -
Hyun-Lock Choo, Jong-Hun Jung, Hwan-Kuk Kim, Vol. 16, No. 4, pp. 51-60, Aug. 2015
10.7472/jksii.2015.16.4.51
Keywords: Malicious JavaScript, Analysis Engine, Static Analysis, Dynamic Analysis, Script-Based Cyber Attack -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism -
Kyung Hee Song, Kyu Tae Kwak, Soo Kyung Park, Bong Gyou Lee, Vol. 15, No. 2, pp. 109-128, Apr. 2014
10.7472/jksii.2014.15.2.109
Keywords: Standardization, Actor Network Theory, Socio-Technical Interpretation, 3D Broadcasting -
Jong-Hwan Kong, Ik Kyun Kim, Myung-Mook Han, Vol. 15, No. 1, pp. 125-134, Feb. 2014
10.7472/jksii.2014.15.1.125
Keywords: Malicious data, Propagation Model, Social Network, Internet Worm -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 3, pp. 35-46, Jun. 2013
10.7472/jksii.2013.14.3.35
Keywords: Android, Malicious Application, Event Aggregation, Mobile Device, Malicious App. Detection -
Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
10.7472/jksii.2013.14.2.61
Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process -
Bong-Gyou Lee, Sung-Joon Lee, Hyun-Sik Seoh, Jun-Ho Kim, Vol. 11, No. 3, pp. 105-120, Jun. 2010
Keywords: Adoption of IPTV Services, Socio-cultural Factor, Flow Experience, Perceived Behavioral Control, Extended Technology Acceptance Model, ETAM