1 |
Jaeyoung Lee, Doeun Kim, Jiyoung Lee, "An Integrity Verification Method for Secure Application on the Smartphone", Journal of Advanced Information Technology and Convergence, Vol. 9, No. 10, pp.223-228, 2011. 10.
|
2 |
Wontae Sim, Jongmyoung Kim, Jaechul Ryu, Bongnam Noh, "Android Application Analysis Method for Malicious Activity Detection", Journal of KIISC(Korea Institution of Information Security and Cryptology) Vol. 21, No.1, pp.213-219, 2011. 2.
과학기술학회마을
|
3 |
Woobong Chun, Junghee Lee, Wonhyung Park, Taemyoung Jung, "The Mobile Security Diagnostic System against Smartphone Threat", Journal of KIISC, Vol.22, No.3, pp.537-544, 2012. 6.
|
4 |
Woohyung Ahn, Jungmin Lee, Seungho Lim, Jaewon Oh, "Detection Malware on Smartphone by Tracking of the Execution of Basic Blocks", Journal of KIISE(Korean Institute of Information Scientists and Engineers): System and Theory, Vol.39, No.3, pp.179-187, 2012. 6
|
5 |
Android Developer Web Site, "Android.com. (2009b, December 16). What is android?", Android Developer (http://developer.android.com/guide/basics/ what-is-android.html), 2009. 12
|
6 |
Kyoungmin Kim, "A Study on Client Information Protection in Domestic Banking As Introducing Smartphone Banking", Journal of KIISC, Vol.20, No.6, pp.51-62, 2010. 12.
|
7 |
Youngdong Kim, Ikwhan Kim, Taehyun Kim, "Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism", Journal of KIISC, Vol.22, No.5, pp.1145-1157, 2012. 10.
과학기술학회마을
|
8 |
Moonyoung Whang, Woong Goh, Dongbum Lee, Jin Gwak, "Certificate Management Plan in Smartphonebanking using the Mobile-Cloud Computing", Proceedings of IEEK(Institute of Electronics Engineers of Korea) Conference, pp. 1873-1876, 2010. 6.
|
9 |
"Andromaly: a behavioral Malware detection framework for android devices", Proceedings of IEEK Conference, pp.1-30, 2010.6
|