Digital Library
Search: "[ keyword: Malicious Code ]" (7)
Fuzzy Cluster Based Diagnosis System for Classifying Computer Viruses
Hyun Sook Rhee The KIPS Transactions:PartB ,
Vol. 14, No. 1, pp. 59-64,
Feb.
2007
10.3745/KIPSTB.2007.14.1.59
10.3745/KIPSTB.2007.14.1.59
A Method for Efficient Malicious Code Detection based on the Conceptual Graphs
Sung Suk Kim , Jun Ho Choi , Young Geon Bae , Pan Koo Kim The KIPS Transactions:PartC,
Vol. 13, No. 1, pp. 45-54,
Feb.
2006
10.3745/KIPSTC.2006.13.1.45
10.3745/KIPSTC.2006.13.1.45
A Study on Malicious Code Detection Using Blockchain and Deep Learning
Deok Gyu Lee KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 2, pp. 39-46,
Feb.
2021
https://doi.org/10.3745/KTCCS.2021.10.2.39
Keywords: Malicious Code, Code Detection, Blockcahin, Deep Learning
https://doi.org/10.3745/KTCCS.2021.10.2.39
Keywords: Malicious Code, Code Detection, Blockcahin, Deep Learning
Detection of Unknown Malicious Scripts Using Static Analysis
Seong Uck Lee , Byung Woo Bae , Hyong Joon Lee , Eun Sun Cho , Man Pyo Hong The KIPS Transactions:PartC,
Vol. 9, No. 5, pp. 765-774,
Oct.
2002
10.3745/KIPSTC.2002.9.5.765
10.3745/KIPSTC.2002.9.5.765
A Study on the Effect of Format String on Secure Programming in C Language
Hyung Bong Lee, Hong Jun Tcha, Hyung Jin Choi The KIPS Transactions:PartC,
Vol. 8, No. 6, pp. 693-702,
Dec.
2001
10.3745/KIPSTC.2001.8.6.693
10.3745/KIPSTC.2001.8.6.693
Improved Original Entry Point Detection Method Based on PinDemonium
Kim Gyeong Min, Park Yong Su KIPS Transactions on Computer and Communication Systems,
Vol. 7, No. 6, pp. 155-164,
Jun.
2018
10.3745/KTCCS.2018.7.6.155
Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation
10.3745/KTCCS.2018.7.6.155
Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation
A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header
Jung Sun Kim , Jung Min Kang , Kang San Kim , Wook Shin KIPS Transactions on Computer and Communication Systems,
Vol. 2, No. 1, pp. 43-50,
Jan.
2013
10.3745/KTCCS.2013.2.1.43
10.3745/KTCCS.2013.2.1.43