[1] K. Thomas, and D. M. Nicol, "The Koobface Botnet and the Rice of Social Malware", IEEE Int. Conf. Malicious and Unwanted Software, (2010): 63-70.
[2] Boo Joong Kang, Kyoung Soo Han, Eul Gyu Im, “Malware Current Status and Detection Technology”, Communications of the Korea Information Science Society, vol. 30, no. 1. (2012): 44-53.
[3] K. H. Lee and J. P. Park, "A Software Vulnerability Analysis System using Learning for Source Code Weakness History", Journal of The Korea Academia Industrial cooperation Society, 18 (2017), 46-52. https://doi.org/10.5762/KAIS.2017.18.11.46.
[4] JooBeom Yun, YoungJoo Shin, "MiGuard: Detecting and Guarding against Malicious Iframe through API Hooking", IEICE Electronics Express. (2011): 460-465.
[5] M. Fredrikson, S. Jha, M. Christodorescu, R. Sailer, and X. Yan, “Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors”, Proceedings of the 2010 IEEE Symposium on Security and Privacy. (2010): 45-60.
[6] Q. Miao, Y. Wang, Y. Cao, X. Zhang, and Z. Liu, “APICapture - a Tool for Monitoring the Behavior of Malware”, Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering. (2010): 390-394.
[7] S. Y. Min, C. S. Jung, K. H. Lee, E. S. Cho, T. B. Yoon and S. H. You, “Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability”, Journal of The Korea Academia Industrial cooperation Society, 18 (2017):1-8. https://doi.org/10.5762/KAIS.2017.18.7.1.
[8] J. Lee, K. Jeong, and H. Lee, “Detecting Metamorphic Malwares using Code Graphs”, Proceedings of the 2010 ACM Symposium on Applied Computing. (2010): 1970-1977.
[9] K. Kim, and B. Moon, “Malware Detection based on Dependency Graph using Hybrid Genetic Algorithm”, Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation. (2010): 1211-1218.
[10] S. H. Oh, T. E. Kim and H. K. Kim, “Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities”, Journal of The Korea Academia Industrial cooperation Society, 18 (2017), 94-103. https://doi.org/10.5762/KAIS.2017.18.11.94.
[11] Korea Information & Security Agency(KISA), October trends: Cyber Security Issue, (2013): 31-42.
[12] Korea Information & Security Agency(KISA), Recent Cyber Attack Trend, Information Sharing Seminar Report, (2014):10-18.
[13] Korea Information & Security Agency(KISA), Large-scale malicious code distribution trend analysis report, (2014):1-15.
[14] Asish Vardhan and M. Murali Krishna, “DGD: An Intrusion Detection System for Providing Security to Web Applications” Journal of Statistical Computing and Algorithm 1.1(2017): 27-32. http://dx.doi.org/10.21742/JSCA.2017.1.1.03.
[15] G Sai Asritha, “Security for files in Operating System” International Journal of Security Technology for Smart Device 3.2(2016): 1-6. http://dx.doi.org/10.21742/IJSTSD.2016.3.2.01.
[16] Lalit Mohan Joshi, and Dr. Rajendra Bharti, “A Research Paper on Online Security Issue with Data Tempering” International Journal of Security Technology for Smart Device 4.1(2017): 1-8. http://dx.doi.org/10.21742/IJSTSD.2017.4.1.01.
[17] Vempati Sudheshna, “Adhoc Network Infrastructure Security” International Journal of Wireless and Mobile Communication for Industrial Systems 3.1(2016): 21-34. http://dx.doi.org/ 10.21742/IJWMCIS.2016.3.1.03.
[18] SeongMuk, Choi, JoongHyo, Bok, HyungTaek, Lee, Jong Bae, Kim and Gwang Yong, Gim, “An Empirical Study on Crawler-based Security Control Systems” International Journal of Reliable Information and Assurance 5.2(2017): 7-12. http://dx.doi.org/10.21742/IJRIA.2017.5.2.02.