1 |
Li Zhuowei, etcs, 'Utilizing Statistical Characteristics of N-grams for Intrusion Detection', Proceedings of the 2003 International Conference of Cyberworlds, pp.212-218
|
2 |
Frank Adelstein, Matt Stillerman, 'Malicious Code Detection for Open Firmware', Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC.02)
|
3 |
www.itfind.or.kr, '유비쿼터스 사회의 사이버 공격 기술 동향', 권호: 1259 발행일: 2006.08.16
|
4 |
Joon S. Park and Gautam Jayaprakash, 'Component Integrity Check and Recovery Against Malicious Codes' Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA''06)
|
5 |
http://cafe.naver.com/jmkim9064/778
|
6 |
A. Murat Fiskiran, 'Runtime Execution Monitoring (REM) to Detect and PreventMalicious Code Execution, Proceedings of the IEEE International Conference on Computer Design (ICCD'4)
|
7 |
Tony Abou-Assaleh, 'N-gram-based Detection of New Malicious Code', Proceedings of the 28th Annual International Computer Software and Applications Conference
|