Zobrazeno 1 - 10
of 68
pro vyhledávání: '"Bong-Nam Noh"'
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 5, Iss 6, Pp 7-12 (2007)
User-Generated Content (UGC) is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship an
Externí odkaz:
https://doaj.org/article/6788ed533a844c16828ba528b605bbe5
Autor:
Sunghyun Park, Bong Nam Noh
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811514647
Symbolic execution, one of the methods of program automatic analysis, has significantly improved technically over the past few years. However, it is still not practical to analyze the program using only the symbolic execution itself. The main reason
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::18cf33c0bd36f9e18615996295168ccf
https://doi.org/10.1007/978-981-15-1465-4_39
https://doi.org/10.1007/978-981-15-1465-4_39
Publikováno v:
Advances in Computer Science and Ubiquitous Computing ISBN: 9789811393402
Recently, as the practical application of deep learning has become possible, research on the problems pertaining to intrusion detection has increased.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::61e6cdf4181e356a01610858e33d0f51
https://doi.org/10.1007/978-981-13-9341-9_1
https://doi.org/10.1007/978-981-13-9341-9_1
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 26:1323-1333
Publikováno v:
Internet and Distributed Computing Systems ISBN: 9783030349134
IDCS
IDCS
The intrinsic features of Internet networks lead to imbalanced class distributions when datasets are conformed, phenomena called Class Imbalance and that is attaching an increasing attention in many research fields. In spite of performance losses due
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50c302172972baa7aabfe8e2ffc4c722
https://doi.org/10.1007/978-3-030-34914-1_29
https://doi.org/10.1007/978-3-030-34914-1_29
Publikováno v:
Digital Investigation. 18:S23-S32
Memory analysis is increasingly used to collect digital evidence in incident response. With the fast growth in memory analysis, however, anti-forensic techniques appear to prevent it from performing the bootstrapping steps — operating system (OS) f
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 24:861-870
According to the intelligence of the malicious code to extract the executable file in physical memory is emerging as an import researh issue. In previous physical memory studies on ex ecutable file extraction which is targeting running files, they ar
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 24:535-545
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 24:327-333
The rapid expansion of the software industry has brought a serious security threat and vulnerability. Many softwares are constantly attacked by exploit codes using security vulnerabilities. Smart fuzzing is automated method to find software vulnerabi
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 23:1121-1129
Recent malware distribution causes severe and nation-wide probl ems such as 3·20 cyber attack in Korea. In particular, Drive-by download attack, which is one of attack types to distr ibute malware through the web, becomes the most prevalent and seri