References
- Why even the best antivirus software isn't enough (and why you still need it) [Internet], https://www.csoonline.com/article/3316480/why-the-best-antivirus-software-isnt-enough.html
- G. S. Kang, "Study on Cloud Computing-Based Malware Detection System," Master, Konkuk University, Korea, 2015.
- S. Y. Choi, "Emulation-Based Abnormal Web Page Link Analysis to Detect Malware-istributing Networks," Master, Jeonnam National University, Korea, 2014.
- Symantech - Internet Security Thresat Report [Internet], https://docs.broadcom.com/docs/istr-24-executive-summary-en
- A. Souri and R. Hosseini, "A state-of-the-art survey of malware detection approaches using data mining techniques," Humand-centric Computing and Information Sciences, Vol.8, No.3, 2018.
- A. Douglas, R. Holloway, J. Lohr, E. Morgan, and K. Harfoush, "Blockchains for constrained edge devices," Blockchain: Research and Applications, Vol.1, Iss.1-2, 2020.
- S. W. Kim, "Real-Time Malware Detection in Intrusion Detection System," Master, Hanyang University, Korea, 2014.
- J. W. Chang, "Study on Detecting Malware and Security Control Measures," Master, Korea University, 2014.
- J. H. Park, "Effect of Private Blockchain Characteristics on Acceptance in Medical Sector," Master, Graduate School of Sungkyunkwan University, Korea, 2018.
- G. Y. Lee, "Study of Applying Blockchain Technology and Record Management System," Master, Myongji University, Korea, 2019.
- P. S. Goh, "Study on Use of Medical Information System with Blockchain," Master, Soongsil University, Korea, 2019.
- D. G. Guh, "Study on Predicting Taxi Passenger Using Deep Learning," Master, University of Seoul, Korea, 2018.
- D. T. Ramotsoela, G. P. Hancke, and A. M. Abu-Mahfouz, "Attack detection in water distribution systems using machine learning," Human-centric Computing and Information Sciences, Vol.9, No.13, 2019.
- S. D. You, C. H. Liu, and W. K. Chen,"Comparative study of singing voice detection based on deep neural networks and ensemble learning," Human-centric Computing and Information Sciences, Vol.8, No.34, 2018.
- S. N. Danilin and S. A. Shchanikov, "Neural network algorithms for determining the values of signal parameters in radio- electronic hardware," 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics), Omsk, 2017, pp.1-4, 2017.
- Y. B. Cho, "Detection Technique of Malware Using Deep Learning-Based R-CNN," Master, Daejeon University, Korea, 2018.
- Y. Cheong, "Blockchain-Based Image Information Management System," Master, Ajou University, Korea, 2019.
- S. I. Jung and H. W. Kim, "Web-Anti-MalWare Malware Detection System," Proceedings of the Korean Society of Computer Information Conference, pp.365-367, 2014.
- D. Lee and J. H. Park, "Future Trends of AI-Based Smart Systems and Services: Challenges, Opportunities, and Solutions," Journal of Information Processing Systems, Vol.15, No.4, pp.717-723, 2019. https://doi.org/10.3745/JIPS.02.0113