References
- 이성희, "Big Data의 이해-가치와 도입전략", 한국정보기술학회지, 제10권, 제1호, pp.63-68, 2011.
- 정용찬, "빅데이터 혁명과 미디어 정책이슈", 정보통신정책연구원, 2012.
- IDG, "빅 데이터의 이해", IDG Tech Report, 2012.
- McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", McKinsey & Company, 2011.
- Ventana Research, "Using Big Data to Deliver Real-Time Insights for IT and the Business", 2011.
- Splunk, "Splunk, Big Data and the Future of Security", White Paper, 2011.
- 이규재, "빅데이터를 위한 플랫폼들", http://helloworld.naver.com /helloworld/29533, 2012.
- Michael Driscoll, "Building data startups: Fast, big, and focused", http://radar.oreilly.com/2011/08/building-data-startups.html, 2011.
- Tom White, Hadoop Definitive Guide, O'Reilly Media, 2009.
- HP, "Next-Generation Application Monitoring: Combining Application Security Monitoring and SIEM", White Paper, 2011.
- 남기효, 김윤홍, 권환우, "최신 정보보호기술 동향: APT 및 그 대응", 주간기술동향, pp.14-25, 2011.
- Help Net Security, "The next step in BYOD Security", http://www.net-security.org/article.php?id=1700, 2012.
- Neil Roiter, "Next-generation firewalls: In depth", http://www.csoonline.com/article/691651/next-generationfirewalls- in-depth, 2011.
- Martignoni, L., Stinson, E., Fredrikson, M., Jha, S. and Mitchell, J., "A Layered Architecture for Detecting Malicious Behaviors", RAID, 2008.
- R. Koch, "Towards Next-Generation Intrusion Detection", 3th Inter-national Conference on Cyber Conflict, pp.151-168, 2011.
- Wei-Yu Chen, and Jazz Wang, "Building a Cloud Computing Analysis System for Intrusion Detection System", CLOUD SLAM, 2009.
- 최대수, 문길종, 김용민, 노봉남, "MapReduce를 이용한 대용량 보안로그 분석", 한국정보기술학회 논문지, 제9권, 제8호, pp.125-131, 2011.