악성코드 탐지를 위한 물리 메모리 분석 기술

The Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 39-44, 2월. 2014
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. Kang, H. Hwang, K. Kim, K. Sohn, B. Noh, "nan," The Korea Institute of Information Security and Cryptology, vol. 24, no. 1, pp. 39-44, 2014.

[ACM Style]
YoungBok Kang, Hyunuk Hwang, Kibom Kim, Kiwook Sohn, and Bongnam Noh. 2014. nan. The Korea Institute of Information Security and Cryptology, 24, 1, (2014), 39-44.