References
- L.C. Tae, J.H, Oh and H,C. Jeong, "Study of the Technique Trend and Analysis Method of Recent Malaware," Communications of the KIISE, Vol.28, No.11, pp.117-125. Nov. 2010.
- Y.-T. Hou, Y. Chang, T. Chen, C.-S. Laih and C.-M. Chen, "Malicious web content detection by machine learning," Expert Systems with Applications, Vol.378, pp.55-60, 2010.
- IBM X-Force Team, "IBM X-Force 2010 Trend and Risk Report", IBM Published, March, 2011
- ByungHa Choi and Kyungsan Cho, "An Improved Detecting Scheme of Malicious Codes using HTTP Outbound Traffic," Journal of the KSCI, Vol.14, No.9 pp.47-54, Aug. 2009. (in Korean)
- Hee-Hwan Park and Dea-Woo Park, "A Study on Treatment Way of a Malicious Code to injected in Windows System File," Journal of the KSCI, Vol.14, No.2, pp.255-262, De. 2006. (in Korean)
- Chong-Woo Woo and Kyoung-Hui Ha, "A Development of Malware Detection Tool based on Signature Patterns," Journal of the KSCI, Vol.10, No.6, pp.127-136, De. 2005. (in Korean)
- N. Proves, D. McNamee, et al., "The Ghost In The Browser Analysis of Web-based Malware", Proc.Of the first USENIX workshop on hot topic in Botnets, 2007.4
- B. Kim, C. Im, H. Jung, "Suspicious Malicious Web Site Detection with Strength Analysis of a JavaScript Obfuscation", International Journal of Advanced Science and Technology, Vol.26, pp.19-32, Jan, 2011.
- Peter Likarish, E. Jung, I. Jo, "Obfuscated Malicious JavaScript Detection using Classification Techniques", in 4th International Conference on Malicious and Unwanted Software, pp.47-54, 2009.
- H. Chang, M. Kim, D. Kim, J. Lee, H. Kim, and S. Cho, "An Implementation of System for Detecting and Filtering Malicious URLs," Journal of KIISE:Computing Practices and Letters, Vol.16, No.4, pp.405-414, Apr. 2010. (in Korean)
- Y. Choi, T. Kim, and S. Choi, "Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis", International Journal of Security and Its Applications, Vol.4, No.2, pp.13-26, Apr. 2010.
- B. Feinstein and D. Peck, "Caffeine Monkey: Automated Collection, Detection and Analysis of Malicious JavaScript", Black Hat USA, 2007.
- Christian Seifert, Ian Welch, Peter Komisarczuk, "Identification of Malicious Web Pages with Static Heuristics," Telecommunication Networks and Applications Conference, pp.91-96, Dec. 2008.
- J. Lee, J. Moon, S. Cho, Y. Lee, M. Park, and W. Choi, "Malicious Web Page Detection Using Malicious Code Spreading Pattern," The 3rd International Conference on Internet (ICONI 2011), pp.195-200, Dec. 2011.
- Chih-Chung Chang and Chih-Jen Lin, LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/-cjlin/libsvm.
Cited by
- 단어 군집 기반 모바일 애플리케이션 범주화 vol.19, pp.3, 2014, https://doi.org/10.9708/jksci.2014.19.3.017