참고문헌
- Steven Rosenbaum, Curation: A Breakthrough from the Age of Info-Glut, Myungjin Publishing Co., Seoul, 2011.
- Jung-Sook Kim, "Video Curating Service System Using Mashup Customization Technique", Journal of Korea Multimedia Society, Vol. 17, No. 4, 2014.
- http://www.wizmeta.com/
- Fischman W, Solomon B, Greenspan D, Gardner H, Making good: how young people cope with moral dilemmas at work. Cambridge: Harvard University Press. 2004.
- Open Web Application Security Project(OWASP), "OWASP Top 10 for 2013", 12 June, 2013.
- The Open Web Application Security Project, "OWASP TOP 10 Project", http://www.owasp.org/
- In-yong Lee, Jae-ik Cho, Kyu-hyung Cho, Jong0sub Moon, "SA Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values", KIISC, 18(5), pp. 135-147, 2008.
- Thomas. S, Williams. L, "Using Automated Fix Generation ot Secure SQL Statements", In Proceeding of the 29th international Conference on Software Engineering Workshops (ICSEW. IEEE Computer Society), pp. 54, 2007.
- Kosuga. Y, Kernel. K, Hanaoka. M, Hishiyama. M, Takahama. Yu, "Sania : Syntactic and Semantic Analysis for Automated Testing against SQL Injection", In Proceedings of the Computer Security Applications Conference 2007, pp. 107-117, 2007.
- Jae-Chul Park, Bong-Nam Noh, "QL Injection Attack Detection : Profiling of Web Application Parameter Using the Sequence Pairwise Alignment", Information Security Applications LNCS, Volume 4298, pp. 74-82, 2007.
- Bozic, J.; Wotawa, F., "XSS pattern for attack modeling in testing", Automation of Software Test (AST), 2013 8th International Workshop on, Vol., No., pp.71-74, May, 2013.
- Shahriar, H.; Zulkernine, M., "S2XS2: A Server Side Approach to Automatically Detect XSS Attacks," Dependable, Autonomic and Secure Computing(DASC), 2011 IEEE Ninth International Conference, Vol., No., pp.7-14, Dec. 2011.
- Hui Zhao; Wen Chen, "A Web Page Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion", Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on , Vol., No., pp.241-245, Oct. 2010.
- Yi Wang; Zhoujun Li; Tao Guo, "Program Slicing Stored XSS Bugs in Web Application," Theoretical Aspects of Software Engineering (TASE), 2011 Fifth International Symposium on, Vol., No., pp.191-194, Aug. 2011.
- Sung-hyuck Hong, "XSS Attack and Countermeasure: Survey", The Journal of Digital Policy & Management, Vol. 11, No. 12, pp. 327-332, 2013.
피인용 문헌
- Program Develope and Class Design for Convergence ICT and Character Education vol.14, pp.9, 2016, https://doi.org/10.14400/JDC.2016.14.9.9
- A study on digital jewelry design through reinterpretation of symbolic element of Peony flower in Minwha with Linguistic analysis vol.14, pp.8, 2016, https://doi.org/10.14400/JDC.2016.14.8.407
- A Study on the Effect of Visual Communication Utilizing Smartphones on Basic Mathematics Education at the Tertiary Level vol.14, pp.10, 2016, https://doi.org/10.14400/JDC.2016.14.10.53
- The effect of E-commerce's curation characteristics on the customer purchase intention - Focusing on the mediating effect of satisfaction - vol.14, pp.5, 2016, https://doi.org/10.14400/JDC.2016.14.5.185