인터넷 멀웨어 분류 방법 및 탐지 메커니즘에 관한 고찰

The Korea Institute of Information Security and Cryptology, Vol. 18, No. 3, pp. 60-73, 6월. 2008
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. Jeon, J. Oh, I. Kim, J. Jang, "nan," The Korea Institute of Information Security and Cryptology, vol. 18, no. 3, pp. 60-73, 2008.

[ACM Style]
Yong-Hee Jeon, Jin-Tae Oh, Ik-Kyun Kim, and Jong-Soo Jang. 2008. nan. The Korea Institute of Information Security and Cryptology, 18, 3, (2008), 60-73.