1 |
Saint Security, Malware analysis report, malwares.com, 2015. 7. 13
|
2 |
Jae-Kyung Park, A Realtime Malware Detection Technique Using Multiple Filter, KSCI, Vol.19, No. 7. 2014. 7.
|
3 |
Jaeho Lee, Sangjin Lee, A Study on Unknown Malware Detection using Digital Forensic Techniques, , JKIISC, Vol24, No. 1, 2014. 2.
|
4 |
JesseBurns,"DevelopingSecureMobileApplications forAndroid:AnintroductiontomakingsecureAndroidapplications",Dec2009.
|
5 |
A.Shabtai,Y.FledelandU.Kanonov,Y.EloviiandS.Dolev. "GoogleAndroid:AState - of - the -ArtReview of Security Mechanisms . " IEEE SecurityandPrivacy,vol.8,issue2,pp.35-442010.
|
6 |
James M. Aquilina, Eoghan Casey, Cameron H. Malin, MalwareForensics-InvestigatingandAnalyzingMaliciousCode", 2008.
|
7 |
Brett Stone-Gross, Ryan Abman, Richard A. Kemmerer, ChristopherKruegel,DouglasG.Steigerwald,andGiovanniV igna, "TheUndergroundEconomyofFakeAntivirusSoftware", 2012.
|
8 |
Sang Min Lee, Hwa Sun Kim, Hune Cho, "Study on OWL-based database built for the efficient operation of human resources bank," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5, No.3, pp.55-64, June 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.06.27
|
9 |
Sattarova Feruza, "Secure Multi-Party Computation in Networks Over A Cross Domain Privacy Preserving Firewall Optimization," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1, No.1, pp.91-98, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.06
|
10 |
Zita Maria Almeida do Vale, Carlos Ramos, Rosslin John Robles, "Effective Use of Multiple Random Walks in P2P Networks," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.4, No.1, pp.1-8, June 2014. DOI: http://dx.doi.org/10.14257/AJMAHS.2014.06.04
DOI
|
11 |
Farkhod Alisherov, "The Security in the Vehicular Ad Hoc Network (VANET) Using Expedite Message Authentication Protocol (EMAP)," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.1, No.1, pp.99-106, Dec. 2011. DOI: http://dx.doi.org/10.14257/AJMAHS.2011.12.03
|
12 |
Chul-Woo Park, Ji-Woong Son, Hyun-Ki Hwang, Ki-Chang Kim, "Detection of systems infected with C&C Zeus through technique of Windows API hooking," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.5 No.2, pp.297-304, April 2015. DOI: http://dx.doi.org/10.14257/AJMAHS.2015.04.11
|