1 |
Jae-Kyung Park, Sang-Yong Choi, "Studing Security Weaknesses of Android System", International Journal of Security and Its Applications, Vol. 9, No.3, pp. 7-12, Mar. 2015.
DOI
|
2 |
Jae-Kyung Park, Sang-Yong Choi, "An Integrity Checking MechanismUsing Physical Independent Storage for Mobile Device", International Journal Control and Automation, Vol.8, No.3, pp.109-114, Mar. 2015.
DOI
|
3 |
Jae-Kyung Park, "A Realtime Malware Detection Technique Using Multiple Filter", Journal of The Korea Society of Computer and Information, Vol. 19, No.7, pp. 77-85, July 2014.
DOI
|
4 |
Hyo-NamKim, "Realtime hybrid analysis based on multiple profile for prevention of malware", Hongik Univ. Feb. 2014.
|
5 |
Jae-Kyung Park, Sung-Jin Kim, "The Design of the expanded BYOD solutions for business mobile users", Journal of The Korea Society of Computer and Information, Vol. 10, No.10, pp. 107-115, October 2014.
|
6 |
Jin-Kyung Kim, "A design of anomaly detection with automata dynamic profile", Hansei Univ., Feb. 2014.
|
7 |
S. Kimand D. H. Lee, "A study on the vulnerability of integrity verification functions of android-based smartphone banking applications". in Journal of The Korea Institute of Information Security & Cryptology (JKIISC), vol. 23, no. 4, pp. 743-755, Aug. 2013.
DOI
ScienceOn
|
8 |
Hyo-Nam, Kimand Jae-Kyoung Park and Yoo-Hun Won, "A Study on the Malware Realtime Analysis Systems Using the Finite Automata", Journal of the Korea society of computer and information, Vol.18, No.5, pp.69-76, Apr. 2013.
DOI
|
9 |
H.S. Moon, B.H. Jung, Y.S. Jeon and J.N. Kim, "A Survey of Mobile Malware Detection Techniques", 2013 Electronics and Telecommunications Trends, Vol. 23. No. 3, pp. 39-46, May. 2013.
|
10 |
Y. Zhou and X. Jiang, "Dissecting AndroidMalware: Characterization and Evolution", Proc 33rd IEEE Symp Security and Privacy, Aug. 2012.
|
11 |
Mobile security technology research society, "Demand and outlook for mobile security technology", Data collection for Mobile security technology research society seminar, Sept. Jun. 2011.
|
12 |
Androulidakis, Digital evidence inmobile phones. IT security professional magazine, Issue 13, pp 36-39, Feb. 2010.
|
13 |
http://www.cnet.com/how-to/protect-yourandroid-device-from-malware/
|
14 |
http://blog.trendmicro.com/trendlabs-security-intelligence/the-communication-function-ofmalicious-urls/
|
15 |
http://www.sophos.com/en-us/security-newstrends/security-trends/malware-goes-mobile/10-tips-to-prevent-mobile-malware.aspx
|
16 |
http://blog.trendmicro.com/trendlabs-securityintelligence/android-installer-hijacking-bugused-as-lure-for-malware/
|
17 |
http://www.etnews.com/20150210000170
|
18 |
http://www.siminilbo.co.kr/news/articleView.html?idxno=391594
|