Digital Library


Search: "[ keyword: IOU ]" (18)
    Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community
    Kim Hae Soo, Kim Mi Hui KIPS Transactions on Computer and Communication Systems, Vol. 12, No. 3, pp. 103-110, Mar. 2023
    https://doi.org/10.3745/KTCCS.2023.12.3.103
    Keywords: Natural Languege Processing, Preprocessing, Deep Learning, Malicious Comment

    A Study on Malicious Code Detection Using Blockchain and Deep Learning
    Deok Gyu Lee KIPS Transactions on Computer and Communication Systems, Vol. 10, No. 2, pp. 39-46, Feb. 2021
    https://doi.org/10.3745/KTCCS.2021.10.2.39
    Keywords: Malicious Code, Code Detection, Blockcahin, Deep Learning

    Detection of Unknown Malicious Scripts Using Static Analysis
    Seong Uck Lee , Byung Woo Bae , Hyong Joon Lee , Eun Sun Cho , Man Pyo Hong The KIPS Transactions:PartC, Vol. 9, No. 5, pp. 765-774, Oct. 2002
    10.3745/KIPSTC.2002.9.5.765

    A Study on the Effect of Format String on Secure Programming in C Language
    Hyung Bong Lee, Hong Jun Tcha, Hyung Jin Choi The KIPS Transactions:PartC, Vol. 8, No. 6, pp. 693-702, Dec. 2001
    10.3745/KIPSTC.2001.8.6.693

    Parsimonious Neural Network and Heuristic Search Method for Software Effort Estimation Model
    Eung Sup Jun The KIPS Transactions:PartD, Vol. 8, No. 2, pp. 154-165, Apr. 2001
    10.3745/KIPSTD.2001.8.2.154

    Improved Original Entry Point Detection Method Based on PinDemonium
    Kim Gyeong Min, Park Yong Su KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 6, pp. 155-164, Jun. 2018
    10.3745/KTCCS.2018.7.6.155
    Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation

    Security Check Scheduling for Detecting Malicious Web Sites
    Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 9, pp. 405-412, Sep. 2013
    10.3745/KTCCS.2013.2.9.405

    A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header
    Jung Sun Kim , Jung Min Kang , Kang San Kim , Wook Shin KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 1, pp. 43-50, Jan. 2013
    10.3745/KTCCS.2013.2.1.43