1 |
Won Hyung Park, Kyeong Cheol Yang, Dong Hwi Lee, KuiNam J Kim, "Study on Improved Detection Rule Formation via Information Leakage Malware Analysis," Journal of Information Security, vol.8, no.4, pp.1-8, December 2008.
과학기술학회마을
|
2 |
http://edyui.blog.me/50117648095
|
3 |
http://blog.daum.net/ruhi81temotu/232
|
4 |
http://www.hanb.co.kr/network/view.html?bi_id=645
|
5 |
J. Jim, "BotNets: Detection and Mitigation," http://www.fedcirc.gov/library/documents/botNetsv32.doc, 2003.
|
6 |
http://www.krcert.or.kr (KISA)
|
7 |
R. Puri, "Bots & Botnet: An Overview," http://www.sans.org/rr/papers/36/1299.pdf, 2003.
|
8 |
R. A. Grimes, "Malicious Mobile Code," O'REILLY, ISBN 1-56592-682-X, 2001.
|
9 |
Won Gyu Lim, Jung Hyun Lee, Su Jin Lim, Won Hyung Park, Kwang Ho Kook, "A Study on Detection and Responding Technology through Window Malware Analysis," Journal of Information Security, vol.10, no.1, pp.20-24, March 2010. 2
|
10 |
Won Gyu Lim, Geon II Heo, Won Hyung Park, Kwang-Ho Kook, "Malware Analysis and Policy Counterplan Against a Transformation of HTTP Header Information," Journal of Information Security, vol.10, no.2, pp.46-49, June 2010.
과학기술학회마을
|