References
- McAfee Labs, "McAfee Labs Threat Report", McAfee, Dec. 2017.
- 강홍구, 김경한, 유대훈, 최보민, 박준형, "악성코드 행위기반 유사도 측정 기법 연구", 한국통신학회 학술대회논문집, pp. 697-698, 2017.
- A. John, R. Peter, "Electric Communi- cation Development," Communications of the ACM, 40, pp. 71-79, May 1997.
- NIST SP 800-150, Guide to Cyber Threat Information Sharing
- 보안뉴스, 국내 진출 글로벌 보안기업-KISA, 사이버위협 대응 '힘 모아', 22. Jun. 2016
- Gandotra, Ekta, Divya Bansaland and Sanjeev Sofat. "Malware analysis and classification: A survey." Journal of Information Security vol. 5, no. 02, pp. 56, 2014 https://doi.org/10.4236/jis.2014.52006
- Xin Hu, Sandeep Bhatkar, Kent Griffin, and Kang G. Shin, "MutantX-S: Scalable Malware Clustering Based on Static Features", USENIX ATC, 2013
- 정지만, 홍성현, 김영재, 명준우, 정선민, 이진우, 김준호, 윤명근, "4차 산업혁명을 대비한 딥러닝 기술의 금융보안 적용 연구", 금융정보보호공모전 최우수논문상 2017.
- Aziz Mohaisen, Omar Alrawi, Mannar Mohaisen, "High-fidelity, behavior-based automated malware analysis and classification", computers & security, vol. 52, pp. 251-266, 2015 https://doi.org/10.1016/j.cose.2015.04.001
- Tomas Locher, Patrick Moor, Stefan Schmid, Roger Wattenhofer, "Free riding in BitTorrent is cheap". in Proc. Workshop on Hot Topics in Networks (HotNets), pp. 85-90, 2006.
- Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, "Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence", arXiv preprint arXiv:1702.00552, 2017.
- Deepak Tosh, Shamik Sengupta, Charles Kamhoua, Kevin Kwiat, Andrew Martin, "An evolutionary game-theoretic framework for cyber-threat information sharing", In Communications(ICC), IEEE, pp. 7341-7346 2015