- 요약
- Abstract
- 1. 서론
- 2. 관련연구
- 3. 다중 서열 정렬
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A101780221
2016
Korean
569
KCI우수등재
학술저널
289-295(7쪽)
1
0
상세조회0
다운로드목차 (Table of Contents)
참고문헌 (Reference)
1 "VxHeaven"
2 "Virus Total"
3 M. Alazab, "Towards understanding malware behaviour by the extraction of API calls" 52-59, 2010
4 C. Willems, "Toward automated dynamic malware analysis using cwsandbox" 5 (5): 32-39, 2007
5 P. Hogeweg, "The alignment of sets of sequences and the construction of phyletictrees : an integrated method" 20 (20): 175-186, 1984
6 C. Notredame, "T-Coffee: A novel method for fast and accurate multiple sequence alignment" 302 (302): 205-217, 2000
7 I. Elias, "Settling the intractability of multiple alignment" 13 (13): 1323-1339, 2006
8 D. Bilar, "Opcodes as predictor for malware" 1 (1): 156-168, 2008
9 L. Wang, "On the complexity of multiple sequence alignment" 1 (1): 337-348, 1994
10 P. Legendre, "Numerical Ecology" Elsevier 2012
1 "VxHeaven"
2 "Virus Total"
3 M. Alazab, "Towards understanding malware behaviour by the extraction of API calls" 52-59, 2010
4 C. Willems, "Toward automated dynamic malware analysis using cwsandbox" 5 (5): 32-39, 2007
5 P. Hogeweg, "The alignment of sets of sequences and the construction of phyletictrees : an integrated method" 20 (20): 175-186, 1984
6 C. Notredame, "T-Coffee: A novel method for fast and accurate multiple sequence alignment" 302 (302): 205-217, 2000
7 I. Elias, "Settling the intractability of multiple alignment" 13 (13): 1323-1339, 2006
8 D. Bilar, "Opcodes as predictor for malware" 1 (1): 156-168, 2008
9 L. Wang, "On the complexity of multiple sequence alignment" 1 (1): 337-348, 1994
10 P. Legendre, "Numerical Ecology" Elsevier 2012
11 I. Santos, "N-gramsbased File Signatures for Malware Detection" 317-320, 2009
12 D. J. Bacon, "Multiple sequence alignment" 191 (191): 153-161, 1986
13 R. C. Edgar, "Multiple sequence alignment" 16 (16): 368-373, 2006
14 S. Tabish, "Malware detection using statistical analysis of byte-level file content" 23-31, 2009
15 A. Sami, "Malware detection based on mining API calls" 1020-1025, 2010
16 I. K. Cho, "Malware Similarity Analysis using API Sequence Alignments" 4 (4): 103-114, 2014
17 C. I. Fan, "Malware Detection Systems Based on API Log Data Mining" 225-260, 2015
18 P. Vinod, "MOMENTUM: metamorphic malware exploration techniques using MSA signatures" 232-237, 2012
19 "Cuckoo Sandbox"
20 W. Just, "Computational complexity of multiple sequence alignment with SP-score" 8 (8): 615-623, 2001
21 "Clustal X"
22 "Clustal Omega"
23 D. Higgins, "CLUSTAL: a package for performing multiple sequence alignment on a microcomputer" 73 (73): 237-244, 1988
24 D. Mount, "Bioinformatics: Sequence and Genome Analysis" Cold spring harbor laboratory press 2001
25 한경수, "API 순차적 특징을 이용한 악성코드 변종 분류 기법" 보안공학연구지원센터 8 (8): 319-335, 2011
26 M. Siddiqui, "A survey of data mining techniques for malware detection using file features" 509-510, 2008
27 Y. Ki, "A Novel Approach to Detect Malware Based on API Call Sequence Analysis" 2015 : 2015
Mandatory Access Control for Android Application Security
Energy-aware EDZL Real-Time Scheduling on Multicore Platforms
A Process Algebra for Modeling Secure Movements of Distributed Mobile Processes
학술지 이력
연월일 | 이력구분 | 이력상세 | 등재구분 |
---|---|---|---|
2021 | 평가예정 | 계속평가 신청대상 (등재유지) | |
2016-01-01 | 평가 | 우수등재학술지 선정 (계속평가) | |
2015-01-01 | 평가 | 등재학술지 유지 (등재유지) | |
2002-01-01 | 평가 | 학술지 통합 (등재유지) |
학술지 인용정보
기준연도 | WOS-KCI 통합IF(2년) | KCIF(2년) | KCIF(3년) |
---|---|---|---|
2016 | 0.19 | 0.19 | 0.19 |
KCIF(4년) | KCIF(5년) | 중심성지수(3년) | 즉시성지수 |
0.2 | 0.18 | 0.373 | 0.07 |