1 |
H. K. Lee, J. H. Seong, Y. C. Kim, J. B. Kim, and G. Y. Gim, "The Automation Model of Ransomware Analysis and Detection Pattern," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 8, pp. 1581-1588, Aug. 2017.
DOI
|
2 |
Y. K. Kim, D. G. Ham, Y. H. Joo, and K. H. Lee, "Analysis and Countermeasures for the Ransomware Cryptolocker," in Proceeding of the 2016 Spring Conference of the Korea Information Processing Society, Seoul, vol. 23, no. 1, pp. 293-293, Apr. 2016.
|
3 |
D. K. Andrew, "Steganalysis of Embedding in Two Least-Significant Bits," IEEE Transactions on Information Forensics and Security. vol. 2, no. 1, pp. 46-54, Feb. 2007.
DOI
|
4 |
B. K. Moon, D. G. Ryoo, M. S. Ko, K. W. Eom, and M. S. Jun, "An Implementation of Database Security Using Steganography in the Web," Journal of The Korea Institute of Information Security and Cryptology, vol. 15, no. 2, pp. 3-11, Apr. 2005.
|
5 |
G. J. Lee, E. J. Yoon, and K. Y. Yoo, "A Key Exchange Protocol based on the Steganography with the QR code," Journal of the Institute of Electronics Engineers of Korea, vol. 50, no. 6, pp. 173-179, Jun. 2013.
|
6 |
File Signature Database. File Signature [Internet]. Available: https://filesignatures.net/.
|
7 |
Telecommunications Technology Association. TTAK.KO-12.0275. Format-Preserving Encryption Algorithm FEA [Internet]. Available: https://tta.or.kr/include/Download.jsp?filename=choan%2F%5B2015-203%5D_%C7%FC%C5%C2+%BA%B8%C1%B8+%BE%CF%C8%A3+FEA.hwp.
|
8 |
Digital Dailey. New encryption technology came out for personal information protection [Internet]. Available: http://www.ddaily.co.kr/news/article.html?no=119354.
|
9 |
S. Y. Jeong, D. W. Hong, and C. H. Seo, "Secure Format-Preserving Encryption for Message Recovery Attack," Journal of Korean Institute of Information Scientists and Engineers, vol. 44, no. 8, pp. 860-869, Aug. 2017.
|