1 |
Qiang Yan, Robert H. Deng, Yingjiu Li, Tieyan Li, "On the Potential of Limitation-oriented Mal ware Detection and Prevention Techniques on Mobile Phones", International Journal of Security and Its Applications, Vol. 4, No. 1, 2010.
|
2 |
김호연, 장성수, 최영현, 정태명, "모바일 환경에서 악성코드 분석을 위한 효율적 동적 분석기법 연구", 한국정보처리학회 2011년도 제35회 춘계학술발표대회, 2011.
|
3 |
Seo, Seung-Hyun, Aditi Gupta, Asmaa Mohamed Sallam, Elisa Bertino, Kangbin Yim, "Detecting mobile malware threats to homeland security through static analysis", Journal of Network and Computer Applications, Volume 38, pp. 43-53, 2014.
DOI
|
4 |
유효선, "모바일오피스 구현- 보안대책마련'최우선'", Network Times, 2011. 3.
|
5 |
Cliff Changchun Zou, Weibo Gong, Don Towsley "Code Red Worm Propagation Modeling and Analysis", Conferrence on Computer and Comm unications Security, 2002.
|
6 |
D. J. Deley and J. Gani, "Epidemic Modeling: An Introduction", Cambridge university Press, 1999.
|
7 |
Charles M. Grinstead, "Introduction to Probability:Second Revised Edition", American Mathemati calSociety, pp405-406, 1997.
|
8 |
박원형, 김영진, 이동휘, 김귀남, "마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구", 정보보안논문지, 제8권 제4호, pp. 173-181, 2008.
|
9 |
한학용, "패턴 인식 개론", 한빛미디어, pp432-438, 2009.
|
10 |
http://www.ahnlab.com/kr/site/securitycenter/asec/asecReportList.do
|