1 |
PROLEXIC, "Prolexic quarterly global ddoS attack report Q1 2014," Apr. 2014.
|
2 |
Seung-hwan Ju, Hee-suk Seo and Jin Kwak, "Study on analysis methodology for android applications," Journal of Internet Technology, vol. 14, no. 5, pp. 851-857, Sep. 2013.
|
3 |
Seung-hwan Ju, Hee-suk Seo and Jin Kwak, "Study on analysis application smartwork," Lecture Notes in Electrical Engineering, vol. 214, pp. 31-37, Dec. 2012.
|
4 |
Ilyoung Hong and Sangjin Lee, "Research on efficient live evidence analysis system based on user activity using android logging system," Journal of The Korea Institute of information Security & Cryptology, vol. 22, no. 1, pp. 67-80, Feb. 2012.
과학기술학회마을
|
5 |
W. Enck, D. Octeau, P. McDaniel and S. Chauduri, "A study of android security," In Proc. of the 20th USENIX Security Symposium, Aug. 2011.
|
6 |
Jun-Sub Kim, Jae-Byoung Yoon, Kyung-Gi Kim, Min-Soo Kim, Jin Kwak and Bong Gyou Lee, "Vulnerability analysis method on android application," Proceeding of CISC-W'12, pp. 161-164, Dec. 2012.
|
7 |
Yujong Jang and Jin Kwak, "Android application verification method using security testbed," Proceeding of CISC-W'12, pp. 161-164, Dec. 2012.
|
8 |
Google, "Android logging system," http://developer.android.com/tools/debugging/debugging-log.html
|
9 |
Google, "Android debug bridge," http://developer.android.com/tools/help/adb.html
|
10 |
Google, "Application fundamentals," http://developer.android.com/guide/components/fundamentals.html
|