Digital Library
Search: "[ keyword: IOU ]" (18)
Preprocessing Technique for Malicious Comments Detection Considering the Form of Comments Used in the Online Community
Kim Hae Soo, Kim Mi Hui KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 3, pp. 103-110,
Mar.
2023
https://doi.org/10.3745/KTCCS.2023.12.3.103
Keywords: Natural Languege Processing, Preprocessing, Deep Learning, Malicious Comment
https://doi.org/10.3745/KTCCS.2023.12.3.103
Keywords: Natural Languege Processing, Preprocessing, Deep Learning, Malicious Comment
A Study on Malicious Code Detection Using Blockchain and Deep Learning
Deok Gyu Lee KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 2, pp. 39-46,
Feb.
2021
https://doi.org/10.3745/KTCCS.2021.10.2.39
Keywords: Malicious Code, Code Detection, Blockcahin, Deep Learning
https://doi.org/10.3745/KTCCS.2021.10.2.39
Keywords: Malicious Code, Code Detection, Blockcahin, Deep Learning
Detection of Unknown Malicious Scripts Using Static Analysis
Seong Uck Lee , Byung Woo Bae , Hyong Joon Lee , Eun Sun Cho , Man Pyo Hong The KIPS Transactions:PartC,
Vol. 9, No. 5, pp. 765-774,
Oct.
2002
10.3745/KIPSTC.2002.9.5.765
10.3745/KIPSTC.2002.9.5.765
A Study on the Effect of Format String on Secure Programming in C Language
Hyung Bong Lee, Hong Jun Tcha, Hyung Jin Choi The KIPS Transactions:PartC,
Vol. 8, No. 6, pp. 693-702,
Dec.
2001
10.3745/KIPSTC.2001.8.6.693
10.3745/KIPSTC.2001.8.6.693
Parsimonious Neural Network and Heuristic Search Method for Software Effort Estimation Model
Eung Sup Jun The KIPS Transactions:PartD,
Vol. 8, No. 2, pp. 154-165,
Apr.
2001
10.3745/KIPSTD.2001.8.2.154
10.3745/KIPSTD.2001.8.2.154
Improved Original Entry Point Detection Method Based on PinDemonium
Kim Gyeong Min, Park Yong Su KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 6, pp. 155-164,
Jun.
2018
10.3745/KTCCS.2018.7.6.155
Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation
10.3745/KTCCS.2018.7.6.155
Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation
Security Check Scheduling for Detecting Malicious Web Sites
Jae Yeong Choi , Sung Ki Kim , Byoung Joon Min KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 9, pp. 405-412,
Sep.
2013
10.3745/KTCCS.2013.2.9.405
10.3745/KTCCS.2013.2.9.405
A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header
Jung Sun Kim , Jung Min Kang , Kang San Kim , Wook Shin KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 1, pp. 43-50,
Jan.
2013
10.3745/KTCCS.2013.2.1.43
10.3745/KTCCS.2013.2.1.43