Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Jae-Wook Jang"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Thousands of malicious applications targeting mobile devices, including the popular Android platform, are created every day. A large number of those applications are created by a small number of professional underground actors; however previous studi
Externí odkaz:
https://doaj.org/article/36babc6b7bb54210b369116021c7c588
Publikováno v:
Digital Investigation. 14:17-35
Mobile security threats have recently emerged because of the fast growth in mobile technologies and the essential role that mobile devices play in our daily lives. For that, and to particularly address threats associated with malware, various techniq
Publikováno v:
Journal of the Society of Naval Architects of Korea. 52:248-254
The strength and fatigue life of Satin and Twill-woven CF/epoxy composite(CFRP) have been investigated. Damage mechanism fatigue method has been used to assess fatigue damage accumulation. It is based on measured residual stiffness and residual stren
Publikováno v:
Journal of the Korea Institute of Information Security and Cryptology. 24:145-154
In this paper, we propose a novel anti-malware system based on behavior profiling, called Andro-profiler. Andro-profiler consists of mobile devices and a remote server, and is implemented in Droidbox. Our aim is to detect and classify malware using a
Publikováno v:
ACS Combinatorial Science. 15:439-446
An efficient, continuous flow electroreactor system comprising a scrubbing column (for absorption) and a biphasic electroreactor (for degradation) was developed to treat gas streams containing benzene. Initial benzene absorption studies using a conti
Publikováno v:
Chemical Engineering Journal. 209:601-606
The authors describe the development and application of an electrochemically assisted wet scrubbing process for H 2 S removal at low temperature. Measurements of the oxidation efficiency of Co(II) at different temperatures demonstrated that its effic
Publikováno v:
Mathematical Problems in Engineering, Vol 2015 (2015)
MATHEMATICAL PROBLEMS IN ENGINEERING
MATHEMATICAL PROBLEMS IN ENGINEERING
As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0c185cb247c6b88d379d65437041e2fb
http://arxiv.org/abs/1606.01971
http://arxiv.org/abs/1606.01971
Autor:
Jae-wook Jang, Huy Kang Kim
Publikováno v:
Mobile Information Systems, Vol 2016 (2016)
Recently, highly well-crafted mobile malware has arisen as mobile devices manage highly valuable and sensitive information. Currently, it is impossible to detect and prevent all malware because the amount of new malware continues to increase exponent
Publikováno v:
SpringerPlus
Mass-market mobile security threats have increased recently due to the growth of mobile technologies and the popularity of mobile devices. Accordingly, techniques have been introduced for identifying, classifying, and defending against mobile threats
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Thousands of malicious applications targeting mobile devices, including the popular Android platform, are created every day. A large number of those applications are created by a small number of professional under-ground actors, however previous stud