부산대학교 도서관
검색
통합검색
소장자료
학술논문
전자저널
학술DB
전자책
교내접속
OFF
로그인
커뮤니티
공지 및 행사
게시판문의
자주묻는질문
전화/이메일 문의
도서관 일정
영문 바로가기
로그인
자료검색
통합검색
소장자료
학술논문
전자저널
학술DB
전자책
온라인강좌
컬렉션
인기도서
신착도서
책 읽는 대학
테마도서
교수저작물 컬렉션
PNU 생산자료
도서관 소식지
연구·학습지원
연구지원
논문작성지원
연구정보가이드
이용교육
학습정보가이드
수업교재정보
자료이용안내
대출/반납
희망도서 신청
원문복사/상호대차
소장학술지 원문제공
외국학술지지원센터
협력기관
자료배달
SDI서비스
교외접속
시설이용안내
개관시간/층별
이용자별안내
열람실
그룹스터디룸
매체 제작/편집실
시설대관
PC/Wi-Fi/모바일
출력/복사/스캔
도서관소개
사명과 비전
역대 도서관장
연혁
조직 및 부서
통계
규정/운영세칙
오시는길
기증/기부
커뮤니티
공지 & 행사
게시판 문의
자주묻는 질문
전화/이메일 문의
도서관 일정
My Library
내서재
대출중인 도서
연체/제재
예약도서
원문복사(상호대차)
이용교육
정보 변경
전체메뉴 열기
로그인하세요
부산대학교 도서관
자료검색
통합검색
소장자료
학술논문
전자저널
학술DB
전자책
온라인강좌
컬렉션
인기도서
신착도서
책 읽는 대학
테마도서
교수저작물 컬렉션
PNU 생산자료
도서관 소식지
연구·학습지원
연구지원
논문작성지원
연구정보가이드
이용교육
학습정보가이드
수업교재정보
자료이용안내
대출/반납
희망도서 신청
원문복사/상호대차
소장학술지 원문제공
외국학술지지원센터
협력기관
자료배달
SDI서비스
교외접속
시설이용안내
개관시간/층별
이용자별안내
열람실
그룹스터디룸
매체 제작/편집실
시설대관
PC/Wi-Fi/모바일
출력/복사/스캔
도서관소개
사명과 비전
역대 도서관장
연혁
조직 및 부서
통계
규정/운영세칙
오시는길
기증/기부
커뮤니티
공지 & 행사
게시판 문의
자주묻는 질문
전화/이메일 문의
도서관 일정
My Library
내서재
대출중인 도서
연체/제재
예약도서
원문복사(상호대차)
이용교육
정보 변경
clear
교내접속
OFF
영문 바로가기
Home
통합검색
학술논문
학술논문
arrow_drop_down
통합검색
ISSN
논문명
저널명
저자명
다국어
세부검색
EBSCO Discovery Service
히라가나
가타가나
독일,프랑스,스페인
그리스
라틴
러시아
로마자
한글고어
단위기호
학술기호
타이어
몽골어
o
ㅋ
ㄱ
ㅅ
ㅈ
ㅌ
ㄷ
촉
ㄴ
ㅎ
ㅂ
ㅃ
ㅁ
야
ㄹ
와
ㅏ
あ
a
ぁ
か
ka
が
ga
さ
sa
ざ
za
た
ta
だ
da
な
na
は
ha
ば
ba
ぱ
pa
ま
ma
や
ya
ゃ
lya
ら
ra
わ
wa
ゎ
lwa
ん
n
l
い
i
ぃ
き
ki
ぎ
gi
し
si
じ
zi
ち
ti
ぢ
di
に
ni
ひ
hi
び
bi
ぴ
pi
み
mi
り
ri
ㅜ
う
u
ぅ
く
ku
ぐ
gu
す
su
ず
zu
つ
tu
づ
du
っ
ぬ
nu
ふ
hu
ぶ
bu
ぷ
pu
む
mu
ゆ
yu
ゅ
lyu
る
ru
ㅔ
え
e
ぇ
け
ke
げ
ge
せ
se
ぜ
ze
て
te
で
de
ね
ne
へ
he
べ
be
ぺ
pe
め
me
れ
re
ㅗ
お
o
ぉ
こ
ko
ご
go
そ
so
ぞ
zo
と
to
ど
do
の
no
ほ
ho
ぼ
bo
ぽ
po
も
mo
よ
yo
ょ
lyo
ろ
ro
を
wo
o
ㅋ
ㄱ
ㅅ
ㅈ
ㅌ
ㄷ
촉
ㄴ
ㅎ
ㅂ
ㅃ
ㅁ
야
ㄹ
와
ㅏ
ア
a
ァ
カ
ka
ガ
ga
サ
sa
ザ
za
タ
ta
ダ
da
ナ
na
ハ
ha
バ
ba
パ
pa
マ
ma
ヤ
ya
ャ
lya
ラ
ra
ワ
wa
ヮ
lwa
ン
n
l
イ
i
ィ
キ
ki
ギ
gi
シ
si
ジ
zi
チ
ti
ヂ
di
ニ
ni
ヒ
hi
ビ
bi
ピ
pi
ミ
mi
リ
ri
ㅜ
ウ
u
ゥ
ク
ku
グ
gu
ス
su
ズ
zu
ツ
tu
ヅ
du
ッ
ヌ
nu
フ
hu
ブ
bu
プ
pu
ム
mu
ユ
yu
ュ
lyu
ル
ru
ヴ
vu
ㅔ
エ
e
ェ
ケ
ke
ゲ
ge
セ
se
ゼ
ze
テ
te
デ
de
ネ
ne
ヘ
he
ベ
be
ぺ
pe
メ
me
レ
re
ㅗ
オ
o
ォ
コ
ko
ゴ
go
ソ
so
ゾ
zo
ト
to
ド
do
ノ
no
ホ
ho
ボ
bo
ポ
po
モ
mo
ヨ
yo
ョ
lyo
ロ
ro
ヲ
wo
ー
ー
독일어
ä
Ä
ö
Ö
ü
Ü
ß
프랑스어
á
à
Á
À
é
è
É
È
ç
Ç
ê
스페인어
à
á
Á
é
É
í
Í
Ó
ó
Ú
ú
Ñ
ñ
ä
Ä
Α
Β
Γ
Δ
Ε
Ζ
Η
Θ
Ι
Κ
Λ
Μ
Ν
Ξ
Ο
Π
Ρ
Σ
Τ
Υ
Φ
Χ
Ψ
Ω
α
β
γ
δ
ε
ζ
η
θ
ι
κ
λ
μ
ν
ξ
ο
π
ρ
ς
σ
τ
υ
φ
χ
ψ
ω
À
Á
Â
Ã
Ä
Å
Æ
Ç
È
É
Ê
Ë
Ì
Í
Î
Ï
Ð
Ñ
Ò
Ó
Ô
Õ
Ö
Ø
Ù
Ú
Û
Ü
Ý
Þ
ß
à
á
â
ã
ä
å
æ
ç
è
é
ê
ë
ì
í
î
ï
ð
ñ
ò
ó
ô
õ
ö
ø
ù
ú
û
ü
ý
þ
ÿ
А
Б
В
Г
Д
Е
Ё
Ж
З
И
Й
К
Л
М
Н
О
П
Р
С
Т
У
Ф
Х
Ц
Ч
Ш
Щ
Ъ
Ы
Ь
Э
Ю
Я
а
б
в
г
д
е
ё
ж
з
и
й
к
л
м
н
о
п
р
с
т
у
ф
х
ц
ч
ш
щ
ъ
ы
ь
э
ю
я
ⅰ
ⅱ
ⅲ
ⅳ
ⅴ
ⅵ
ⅶ
ⅷ
ⅸ
ⅹ
Ⅰ
Ⅱ
Ⅲ
Ⅳ
Ⅴ
Ⅵ
Ⅶ
Ⅷ
Ⅸ
Ⅹ
ㅥ
ㅦ
ㅧ
ㅨ
ㅩ
ㅪ
ㅫ
ㅬ
ㅭ
ㅮ
ㅯ
ㅰ
ㅱ
ㅲ
ㅳ
ㅴ
ㅵ
ㅶ
ㅷ
ㅸ
ㅹ
ㅺ
ㅻ
ㅼ
ㅽ
ㅾ
ㅿ
ㆀ
ㆁ
ㆂ
ㆃ
ㆄ
ㆅ
ㆆ
ㆇ
ㆈ
ㆉ
ㆊ
ㆋ
ㆌ
ㆍ
ㆎ
′
″
℃
Å
¢
£
¥
¤
℉
‰
$
%
F
₩
㎕
㎖
㎗
ℓ
㎘
㏄
㎣
㎤
㎥
㎦
㎙
㎚
㎛
㎜
㎝
㎞
㎟
㎠
㎡
㎢
㏊
㎍
㎎
㎏
㏏
㎈
㎉
㏈
㎧
㎨
㎰
㎱
㎲
㎳
㎴
㎵
㎶
㎷
㎸
㎹
㎀
㎁
㎂
㎃
㎄
㎺
㎻
㎽
㎾
㎿
㎐
㎑
㎒
㎓
㎔
Ω
㏀
㏁
㎊
㎋
㎌
㏖
㏅
㎭
㎮
㎯
㏛
㎩
㎪
㎫
㎬
㏝
㏐
㏓
㏃
㏉
㏜
㏆
±
×
÷
≠
≤
≥
∞
∴
∠
⊥
⌒
∂
∇
≡
≒
≪
≫
√
∽
∝
∵
∫
∬
∈
∋
⊆
⊇
⊂
⊃
∪
∩
∧
∨
¬
⇒
⇔
∀
∃
∮
∑
∏
+
-
<
=
>
ก
ข
ฃ
ค
ฅ
ฆ
ง
จ
ฉ
ช
ซ
ฌ
ญ
ฎ
ฏ
ฐ
ฑ
ฒ
ณ
ด
ต
ถ
ท
ธ
น
บ
ป
ผ
ฝ
พ
ฟ
ภ
ม
ย
ร
ฤ
ล
ฦ
ว
ศ
ษ
ส
ห
ฬ
อ
ฮ
ฯ
ะ
ั
า
ำ
ิ
ี
ึ
ื
ุ
ู
ฺ
฿
เ
แ
โ
ใ
ไ
ๅ
ๆ
็
่
้
๊
๋
์
ํ
๎
๏
᠀
᠁
᠂
᠃
᠄
᠅
᠆
᠇
᠈
᠉
᠊
᠐
᠑
᠒
᠓
᠔
᠕
᠖
᠗
᠘
᠙
ᠠ
ᠡ
ᠢ
ᠣ
ᠤ
ᠥ
ᠦ
ᠧ
ᠨ
ᠩ
ᠪ
ᠫ
ᠬ
ᠭ
ᠮ
ᠯ
ᠰ
ᠱ
ᠲ
ᠳ
ᠴ
ᠵ
ᠶ
ᠷ
ᠸ
ᠹ
ᠺ
ᠻ
ᠼ
ᠽ
ᠾ
ᠿ
ᡀ
ᡁ
ᡂ
ᡃ
ᡄ
ᡅ
ᡆ
ᡇ
ᡈ
ᡉ
ᡊ
ᡋ
ᡌ
ᡍ
ᡎ
ᡏ
발행년
-
(예 : 2010-2015)
'학술논문'
에서 검색결과
300
건 | 목록
1~10
전체선택
내보내기
Relevance
arrow_drop_down
Relevance
Date Newest
Date Oldest
10
arrow_drop_down
5
10
20
30
40
50
format_list_bulleted
format_list_bulleted
E-mail
EndNote
RefWorks
On the impact of memory corruption vulnerabilities in client applications
Gawlik, Robert
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Bypassing Kernel-Integrity Protection Mechanisms
Freiling, Felix
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
The InMAS Approach
The InMAS Approach
Engelberth, Markus
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Data-only Malware
Data-only malware
Vogl, Sebastian Wolfgang
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
The InMAS Approach
The InMAS Approach
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Towards detection and prevention of malicious activities against web applications and internet services
Zarras, Apostolos
;
Zarras, apostolos
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Detecting Bots with Automatically Generated Network Signatures
Bilge, Leyla
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Learning and Classification of Malware Behavior
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Ermittlung von Verwundbarkeitenmit elektronischen Ködern
Identification of vulnerabilities with electronic baits
Dornseif, Maximillian
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Towards Proactive SPAM Filtering
Göbel, Jan
Open Access (Europeana)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
1
2
3
4
…
17
18
19
20
다음
검색 결과 제한하기
arrow_forward
제한된 항목
[AR] Holz, Thorsten
clear
발행연도 제한
-
재검색
학술DB(Database Provider)
Complementary Index
(61)
OAIster
(61)
ACM Full-Text Collection
(49)
arXiv
(46)
IEEE Xplore Digital Library
(39)
Europeana
(16)
Science Citation Index Expanded
(9)
Supplemental Index
(4)
Academic Search Complete
(3)
Business Source Complete
(3)
Springer Nature Journals
(3)
De Gruyter Online
(2)
Communication & Mass Media Complete
(1)
Gale General OneFile
(1)
MathSciNet via EBSCOhost
(1)
ScienceDirect
(1)
add
remove
더보기
zoom_in
재검색
저널명(출판물, Title)
acm international conference proceeding series
(8)
journal of computer security
(6)
datenschutz und datensicherheit - dud
(4)
ieee security & privacy
(4)
proceedings of the 28th annual computer security applications conference
(4)
2024 ieee symposium on security and privacy (sp), symposium on security and privacy (sp), 2024 ieee, sp
(3)
computer speech & language
(3)
detection of intrusions & malware & vulnerability assessment (9783319406664)
(3)
pik - praxis der informationsverarbeitung und kommunikation
(3)
proceedings of the 15th acm asia conference on computer and communications security
(3)
proceedings of the 30th annual computer security applications conference
(3)
2010 ieee symposium on security and privacy, security and privacy (sp), 2010 ieee symposium on
(2)
2015 ieee symposium on security and privacy, security and privacy (sp), 2015 ieee symposium on
(2)
2018 ieee european symposium on security and privacy (euros&p), security and privacy (euros&p), 2018 ieee european symposium on, eurosp
(2)
2019 ieee european symposium on security and privacy (euros&p), security and privacy (euros&p), 2019 ieee european symposium on
(2)
annual computer security applications conference
(2)
ieee internet computing
(2)
international journal of network management
(2)
it - information technology
(2)
proceedings of the 12th conference on security and privacy in wireless and mobile networks
(2)
proceedings of the 14th acm conference on security and privacy in wireless and mobile networks
(2)
proceedings of the 18th acm conference on computer and communications security
(2)
proceedings of the 2010 acm symposium on applied computing
(2)
proceedings of the 2013 acm sigsac conference on computer & communications security
(2)
proceedings of the 2014 acm sigsac conference on computer and communications security
(2)
proceedings of the 29th annual computer security applications conference
(2)
proceedings of the 33rd annual computer security applications conference
(2)
proceedings of the 35th annual computer security applications conference
(2)
2008 3rd international conference on malicious and unwanted software (malware), malicious and unwanted software, 2008. malware 2008. 3rd international conference on
(1)
2008 european conference on computer network defense, computer network defense, 2008. ec2nd 2008. european conference on
(1)
2009 6th international workshop on visualization for cyber security, visualization for cyber security, 2009. vizsec 2009. 6th international workshop on
(1)
2009 european conference on computer network defense, computer network defense (ec2nd), 2009 european conference on
(1)
2011 first syssec workshop, syssec workshop (syssec), 2011 first
(1)
2011 ieee symposium on security and privacy, security and privacy (sp), 2011 ieee symposium on
(1)
2012 ieee symposium on security and privacy, security and privacy (sp), 2012 ieee symposium on
(1)
2013 ieee symposium on security and privacy, security and privacy (sp), 2013 ieee symposium on
(1)
2014 twelfth annual international conference on privacy, security and trust, privacy, security and trust (pst), 2014 twelfth annual international conference on
(1)
2015 13th annual conference on privacy, security and trust (pst), privacy, security and trust (pst), 2015 13th annual conference on
(1)
2015 international conference and workshops on networked systems (netsys), networked systems (netsys), 2015 international conference and workshops on
(1)
2016 ieee european symposium on security and privacy (euros&p), security and privacy (euros&p), 2016 ieee european symposium on
(1)
2017 47th annual ieee/ifip international conference on dependable systems and networks (dsn), dependable systems and networks (dsn), 2017 47th annual ieee/ifip international conference on, dsn
(1)
2017 ieee conference on network function virtualization and software defined networks (nfv-sdn), network function virtualization and software defined networks (nfv-sdn), 2017 ieee conference on
(1)
2017 ieee symposium on security and privacy (sp), security and privacy (sp), 2017 ieee symposium on, sp
(1)
2018 ieee wireless communications and networking conference workshops (wcncw), wireless communications and networking conference workshops (wcncw), 2018 ieee
(1)
2019 apwg symposium on electronic crime research (ecrime), electronic crime research (ecrime), 2019 apwg symposium on
(1)
2019 ieee conference on communications and network security (cns), communications and network security (cns), 2019 ieee conference on
(1)
computer security - esorics 2005
(1)
financial cryptography and data security
(1)
informatik spektrum: organ der gesellschaft fur informatik e.v. und mit ihr assoziierter organisationen
(1)
sc magazine
(1)
add
remove
더보기
zoom_in
재검색
출판사(Publisher)
ieee
(50)
springer nature
(31)
association for computing machinery
(19)
ios press
(6)
de gruyter
(4)
ieee computer soc
(4)
institute of electrical and electronics engineers inc.
(3)
schloss dagstuhl - leibniz-zentrum fur informatik
(3)
academic press inc.
(2)
assoc computing machinery
(2)
dagstuhl seminar proceedings. 08102 - perspectives workshop: network attack detection and defense
(2)
fakultat fur mathematik und informatik. institut fur informatik
(2)
springer fachmedien wiesbaden
(2)
universitat mannheim
(2)
universitatsbibliothek der tu munchen
(2)
university library of munich
(2)
wiley-blackwell
(2)
academic press ltd- elsevier science ltd
(1)
de gruyter oldenbourg
(1)
elsevier ltd
(1)
haymarket media, inc.
(1)
ieee-inst electrical electronics engineers inc
(1)
oasics - openaccess series in informatics. 4th international workshop on security and dependability of critical embedded real-time systems (certs 2019)
(1)
schloss dagstuhl - leibniz-zentrum fuer informatik
(1)
springer berlin heidelberg
(1)
springer, heidelberg
(1)
add
remove
더보기
zoom_in
재검색
자료유형(Source Type)
Conference Materials
(111)
Electronic Resources
(61)
Reports
(46)
Academic Journals
(34)
Books
(28)
Magazines
(4)
Reviews
(1)
add
remove
더보기
zoom_in
재검색
주제어
computer science - cryptography and security
(40)
computing and processing
(36)
computer science
(24)
communication, networking and broadcast technologies
(21)
informatik
(16)
privacy
(16)
components, circuits, devices and systems
(15)
security
(13)
malware
(11)
software
(11)
internet
(10)
computer security
(9)
computer science - machine learning
(8)
fuzzing
(8)
computer science - computers and society
(6)
mobile security
(6)
binary analysis
(5)
computer bugs
(5)
computer communication networks
(5)
computer science - artificial intelligence
(5)
computers and society
(5)
data encryption
(5)
malicious software
(5)
management of computing and information systems
(5)
signal processing and analysis
(5)
software security
(5)
computer science - software engineering
(4)
computer science - sound
(4)
computersicherheit
(4)
conferences
(4)
cryptanalysis
(4)
engineering profession
(4)
layout
(4)
machine learning
(4)
monitoring
(4)
operating systems
(4)
robotics and control systems
(4)
web security
(4)
aerospace electronics
(3)
android
(3)
automatic speech recognition
(3)
classification
(3)
clustering
(3)
code reuse attacks
(3)
codes
(3)
computer networks
(3)
computer science - computation and language
(3)
computer science - computer vision and pattern recognition
(3)
computer viruses
(3)
cryptography
(3)
add
remove
더보기
zoom_in
재검색
언어
english
(146)
german
(6)
add
remove
더보기
zoom_in
재검색
메일 발송
이메일
취소
확인
팝업 닫기
폴더 추가
팝업 닫기