참고문헌
- Athiwaratkun,Ben, and Jack W, Stokes, "Malware classification with LSTM and GRU language models and a characterlevel CNN.", 2017, Available: https://www.microsoft.com/en-us/research/wp-content/uploads/2017/07/LstmGruCnnMalwareClassifier.pdf, 2017
- Seok,Seon-Hee and Kim,Ho-Won "Visualized malware classification based-on convolutional neural network". Journal of the Korea Institute of Information Security and Cryptology, vol.26, no. 1, p.197, Available: http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBBHCB_2016_v26n1_197, Feb. 2016 https://doi.org/10.13089/JKIISC.2016.26.1.197
- A. Test, "Malware Statistics.", Available: https://www.av-test.org/en/s tatistics/malware//,2015. September, 2015.
- Anderson,Hyrrum-S, Woodbridge,Jonathan and Filar,Bobby "DeepDGA: Adversarially-tuned domain generation and detection." In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, p.13. Vienna, Austria, 2016, Available: https://arxiv.org/pdf/1610.01969
- Razvan,Pascanu, Jack W,Stokes, Hermineh Sanossian, Mady Marinescu, Anil Thomas, "Malware classification with recurrent networks." in Proceeding of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing, p. 1916, Queensland, Australia. Available: https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/pascanuIcassp2015.pdf, 2015
- Jack W.Stokes, De.Wang, Mady Marinescu, Marc Marino,and Brian Bussone, "Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Classification Models." Journal of the Cryptography and Security, Available: https://arxiv.org/pdf/1712.05919, 2017.
- Cho, Young-Bok, Woo,Sung-Hee, Lee, Sang-Ho and Han, Chang-Su, "CUDA based Medical Image High Speed Processing Algorithm," in Proceeding of the 2017 International Conference on Future Information Communication Engineering, vol 9, no.1, p. 213, Russia, 2017, Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE07203503
- Giambattista Parascandolo, Heikki Huttunen and Tuomas Virtanen, "Recurrent neural networks for polyphonic sound event detection in real life recordings", in Proceeding of the 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, p. 6440, Shanghai, China, 2016, Available: https://arxiv.org/pdf/1604.00861
- Cho,Young-Bok, Woo,Sung-Hee and Lee,Sang-Ho,"Security Issues Using Remote Medical Treatment in Health Care In formation," in Proceeding of the 2014 International Conference On Future Information & Communication Engineering, vol. 6, no. 1, p.193, 2014. Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE07221599
- Cho,Young-Bok, Woo,Sung-Hee and Lee,Sang-Hoo "Genetic lesion matching algorithm using medical image", Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no.5.p.960, May 2017 https://doi.org/10.6109/jkiice.2017.21.5.960
- Heaton,J.B,Polson,N.G and Witte,J.H "Deep learning for finance: deep portfolios." Journal of the Applied Stochastic Models in Business and Industry, vol. 33, no. 1, p.3, October 2016, Available: https://doi.org/10.1002/asmb.2209
- Yoon,Hye-Jin, Kim,Chang-Sik, Kwahk Kee-Young,"Research Trends Investigation Using Text Mining Techniques: Focusing on Social Network Services", Journal of Digital Content Society(JDCS), Vol. 19, No. 3, March. 2018, Available: http://www.dbpia.co.kr/Journal/ArticleDetail/NODE07408880
피인용 문헌
- 적층 콘볼루션 오토엔코더를 활용한 악성코드 탐지 기법 vol.20, pp.2, 2018, https://doi.org/10.7236/jiibc.2020.20.2.39