By Topic

A Study on Malicious Codes Pattern Analysis Using Visualization

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
DongHwi Lee ; Dept. of Ind. Security, Kyonggi Univ., Suwon, South Korea ; In Soo Song ; Kim, K.J. ; Jun-hyeon Jeong

The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization possible to make one image for thousands upon thousands of malicious code. and It is possible to extract unseen pattern. Therefore this paper of object is various malicious code analysis besides new or variant malicious code type or form deduction using visualization of strong. Thus this paper proposes unseen malicious code pattern extract.

Published in:

Information Science and Applications (ICISA), 2011 International Conference on

Date of Conference:

26-29 April 2011