Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A study on the live forensic techniques for anomaly detection in user terminals

Full metadata record
DC Field Value Language
dc.contributor.authorKim, A.C.-
dc.contributor.authorPark, W.H.-
dc.contributor.authorLee, D.H.-
dc.date.accessioned2021-09-06T10:05:02Z-
dc.date.available2021-09-06T10:05:02Z-
dc.date.created2021-06-17-
dc.date.issued2013-
dc.identifier.issn1738-9976-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/106010-
dc.description.abstractDigital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.-
dc.languageEnglish-
dc.language.isoen-
dc.subjectAnomaly detection-
dc.subjectDigital forensic-
dc.subjectLive Forensics-
dc.subjectMalicious codes-
dc.subjectMalwares-
dc.subjectSupporting tool-
dc.subjectUser terminals-
dc.subjectComputer crime-
dc.titleA study on the live forensic techniques for anomaly detection in user terminals-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, D.H.-
dc.identifier.scopusid2-s2.0-84877115294-
dc.identifier.bibliographicCitationInternational Journal of Security and its Applications, v.7, no.1, pp.181 - 188-
dc.relation.isPartOfInternational Journal of Security and its Applications-
dc.citation.titleInternational Journal of Security and its Applications-
dc.citation.volume7-
dc.citation.number1-
dc.citation.startPage181-
dc.citation.endPage188-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusAnomaly detection-
dc.subject.keywordPlusDigital forensic-
dc.subject.keywordPlusLive Forensics-
dc.subject.keywordPlusMalicious codes-
dc.subject.keywordPlusMalwares-
dc.subject.keywordPlusSupporting tool-
dc.subject.keywordPlusUser terminals-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordAuthorAnomaly detection-
dc.subject.keywordAuthorLive forensics-
dc.subject.keywordAuthorMalware-
dc.subject.keywordAuthorUser terminals-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE