02509nam a2200601 c 4500001001300000005001500013007000300028008004100031041001300072049002800085052001700113056001400130082001400144245045500158260005400613300004100667490004700708504002900755546002500784650004300809700005600852700005600908700002200964700002200986700002201008700002201030700002201052700002201074700002201096700002201118700002201140700002201162700002201184710005601206830007301262880008701335880005901422880002501481880002601506880002801532880002901560880002701589880002901616880003101645880003101676880003101707880002901738880003101767880002601798880002701824880004201851950001401893KMO20163081220170907095346ta160526s2015 ulkad 000 kor 0 akorbeng0 lEM6410396lEM6410397c201a004.66b16-1 a004.662601a005.8223006880-01a악성코드 유포 탐지기술 현황 조사 및 발전모델 연구 =xA study on analyzing the current malware detection technologies and planning for the development model of detection & response system /d수탁 기관: 한국정보보호학회 ;e연구책임자: 유진호,e김민수 ;e참여연구원: 정호준,e전창욱,e김용주,e황윤희,e김성현,e김평강,e최민경,e한명욱,e황정식,e이광호,e이규철 6880-02a서울 :b한국인터넷진흥원,c2015 a9, 168 p. :b삽화, 도표 ;c26 cm10a최종연구보고서 ;vKISA-WP-2015-0061 a참고문헌: p. 164-168 a영어 요약 있음 8a악성 코드[惡性--]0KSH20050138331 6880-03a유진호,g柳眞浩,d1969-0KAC2017345401 6880-04a김민수,g金玟洙,d1967-0KAC2016128451 6880-05a정호준1 6880-06a전창욱1 6880-07a김용주1 6880-08a황윤희1 6880-09a김성현1 6880-10a김평강1 6880-11a최민경1 6880-12a한명욱1 6880-13a황정식1 6880-14a이광호1 6880-15a이규철 6880-16a한국정보보호학회0KAB2015003734aut 0a최종연구보고서(한국인터넷진흥원) ;vKISA-WP-2015-0061006245-01/(BaAkseong kodeu yupo tamji gisul hyeonhwang josa mit baljeon model yeongu 6260-02/(BaSeoul :bHanguk Inteonet Jinheungwon,c20151 6700-03/(BaYu, Jinho1 6700-04/(BaGim, Minsu1 6700-05/(BaJeong, Hojun1 6700-06/(BaJeon, Changuk1 6700-07/(BaGim, Yongju1 6700-08/(BaHwang, Yunhui1 6700-09/(BaGim, Seonghyeon1 6700-10/(BaGim, Pyeonggang1 6700-11/(BaChoe, Mingyeong1 6700-12/(BaHan, Myeonguk1 6700-13/(BaHwang, Jeongsik1 6700-14/(BaI, Gwangho1 6700-15/(BaI, Gyucheol 6710-16/(BaHanguk Jeongbo Boho Hakhoe1 a비매품