1 |
SAS Institute, "Machine Learning: What it is & why it matters", https://www.sas.com/en_us/insights/analytics/machine-learning.html (November 1, 2020)
|
2 |
H. Lee, S. Chung, E. Choi, "A Case Study on Machine Learning Applications and Performance Improvement in Learning Algorithm," Journal of Digital Convergence, Vol.14, No.2 pp.245-258, 2016.
DOI
|
3 |
Machine Learning for Malware Detection, Kasperskey Lab, Edward Raff, Malware Detection by Eating a Whole EXE, NVIDIA, 2017.
|
4 |
The Linux Foundation Project, Hyperledger Project URL: https://www.hyperledger.org
|
5 |
Security Technology Research Team, "Introduction of malicious code detection research by foreign companies using machine learning," Financial Security Institute Technical Report, 2018-029, 2018, 4, http://www.fsec.or.kr/common/proc/fsec/bbs/42/fileDownLoad/1520.do
|
6 |
Dong-Hyeok Park, Eui-Jung Myeong, Joobeom Yun, "Efficient Detection of Android Mutant Malwares Using the DEX file", Korea Institute Of Information Security And Cryptology, Vol.26, No.4, pp.895-902. 2016.
DOI
|
7 |
Da-Hye Kim, Myeon-ggeon Lee, Min-Su Song, Seong-je Cho, "Machine Learning based Android Malware Detection using Gray Scale Images", KOREA INFORMATION SCIENCE SOCIETY, 1245-1247. 2018.
|
8 |
S.J Cho, "Latest Android malicious app trends and detection techniques," iitp technical report, 2019, 9
|
9 |
Symantec. Internet Security Threat Report. Volume 23. March 2018. https://docs.broadcom.com/doc/istr-23-2018-en.
|
10 |
Victor Chebyshev. Mobile malware evolution 2019. February 25, 2020. http://securelist.com/mobile-malware-evolution-2019/96280/.
|
11 |
Androguard. https://github.com/androguard/androguard.
|
12 |
scikit-learn. https://scikit-learn.org/.
|
13 |
S.M.Hwang and H.W.Lee, "Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain," Journal of Internet Computing and Services, Vol.20, No.2, pp.61-68, 2019. DOI: 10.7472/jksii.2019.20.2.61.
DOI
|
14 |
H.S.Lee and H.W.Lee, "Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer," Journal of Internet Computing and Services, Vol.20, No.5, pp.9-18, 2019. DOI: 10.7472/jksii.2019.20.5.9.
DOI
|
15 |
H.S.Lee and H.W.Lee, "Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps," Journal of Korea Internet on Things Society, Vol.6, No.2, pp.1-10, 2020. DOI: 10.20465/KIOTS,2020.6.2.001.
DOI
|