은닉형 악성코드를 활용한 공격 사례 분석과 대응방안에 대한 고찰

The Korea Institute of Information Security and Cryptology, Vol. 26, No. 1, pp. 92-98, 2월. 2016
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. Ji, J. Park, J. Lee, "nan," The Korea Institute of Information Security and Cryptology, vol. 26, no. 1, pp. 92-98, 2016.

[ACM Style]
Seon-Hak Ji, Ji-Yun Park, and Jae-Woo Lee. 2016. nan. The Korea Institute of Information Security and Cryptology, 26, 1, (2016), 92-98.