共 10 条
- [1] HUH Moon Yul, 2009, Communications for Statistical Applications and Methods, V16, P143
- [2] 김지원, 2017, [Journal of Security Engineering, 보안공학연구논문지], V14, P263, DOI 10.14257/jse.2017.08.06
- [3] Kim J.H, 2017, KOR 1 COMM INF SCI 2, P590
- [4] Lee Hooki, 2017, [Journal of the Korea Institute Of Information and Communication Engineering, 한국정보통신학회논문지], V21, P1581, DOI 10.6109/jkiice.2017.21.8.1581
- [5] McDonald G., 2012, SYMANTEC SECURITY RE
- [6] Moser A, 2007, 23 ANN COMP SEC APPL
- [7] Sgandurra D., 2016, ARXIV160903020
- [8] Thomas M.C., 2006, ELEMENTS INFORM THEO, V2nd
- [9] Tseng Aragorn, 2016, IEICE TECH REP, V116, P87
- [10] Classification of ransomware families with machine learning based on N-gram of opcodes [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 : 211 - 221