[journal]
/ 2003
/ “침입기법을 응용한 침입자 역추적 시스템 설계에 관한 연구” 한국 컴퓨터정보학회 논문지 제8권제3호
8
(3)
[journal]
/ 2003
/ “이동에이전트를 이용한 침입탐지 모델의 제안” 한국 컴퓨터정보학회 논문지 제9권제1호
9
(1)
[journal]
/ 2003
/ Available at http//b2b
[journal]
/ 1996
/ Available at http
[journal]
/ 1997
/ ” Proceedings of the 7th international Virus Bulletin Conference
[journal]
/ 2000
/ Script-Based Mobile Threats
[journal]
/ 1995
/ “Dynamic detection and classification of computer viruses using general behavior patterns”
/ 5th International Virus Bulletin Conference
[journal]
/ 2001
/ Heuristic Engines
/ 11th Internation Virus Bulletin Conference
[journal]
/ 2003
/ “A Taxonomy of Computer Worms” ACM CCS Workshop on Rapid Malcode
[journal]
/ 1988
/ The Internet Worm Program: An Analysis
[journal]
/ 2004
/ “Advanced communication techniques of remote access Trojan horses on windows operation systems” Available at http
[journal]
/ 2003
/ Malware: Fighting Malicious Cod
/ Prentice Hall PTR
[journal]
/ 2001
/ Virus Protection for Windows”
[journal]
/ 1999
/ Available at http