References
- National Cyber Security Center, "Monthly Cyber Security" , pp.2-12, 2007.
- National Internet Development Agency of Korea, "Survey on the Internnet Usage" , pp 11, 2008. 11.
- 2011 Cyber Security Watch Survey, "CSO Magazin, U.S. Secret Service and Carnegie Mellon University&Deloitte", 2011
- Chang, Hang-Bae, Song, Ji-Hoon," The Exploratory Study on the Evaluation of Security System for Industrial Technology Leakage Prevention", The Journal of Korea Association for Industry Security, Vol.1 No.1 2009.12
- Jo-Ting Wei, Shih-Yen Lin, Hsin-Hung Wu, "A review of the application of RFM model", Journal of Business Management, Vol.4 No.19,.2010
- Seung Pyo Huh , Dae Sung Lee , Kui Nam Kim , "A Study on The Leak of Core Business Technologies Using Preventative Security Methods Such as Clustering", Convergence security journal 2010.09
- Yeonwoo Lee Hyun-mi Jang Seng-phil Hong , "Design plan personal information management model large to protect the personal information Big data environment" , Korea Internet Information Society national conference of the Papers, VOL 13 NO. 02 PP. 0029 -0030 (2012. 11)
- Salvatore J. Stolfo, Steven M. Bellonvin, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, "Security Beyond the Hacker", Springer, 2008
- Rebecca Bacel and Peter Mell, "Intrusion Detection Systems", NIST, 2003.
- Carl Endorf, Eugene Schultz, Jim Mellander, "Intrusion Detection & Prevention", McGrawHill, 2004.
- H. Debar, M. Dacie, and A. Wepsi, "A Revised Taxonomy for Intrusion- Detection Systems", IBM Report, 1999.
- F.Apap, A. Honnig, S.Hershkop, E.Eskin, and S.Stolfo. Detecting malicious software by monitoring anomalous windows registry accesses. Proceedings of the Fitth International Symposium on Recent Advances in Intrusion Detection(RAID 2002), 2002.
- Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo. An Email Worm Vaccine Architecture. Proceeding of the First Information Security Practice and Experience(ISPEC 2005), 2005.
- Apap, F., Honkg, A., Hershkop, S., Eskin, E., Stolfo, S.J : Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection(RAID). 2002.
- Carsten Willems, Thorsten Holz, and Felix Freiling, : Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security & Privacy. 2007.
- Jong-Ho Eom, The Quantitive Evaluation of a Level of Insider Activity using SFI Analysis Techniques, Journal of Security Engineering (2013), Vol.10 No.2
- H. W. Shin, Methodology to analyze insider risk for the prevention of corporate data leakage, Journal of Korea University Graduated School, (2012)
- D. J. Ha, Customer Relation Management based on Association rule and RFM Techniques, Journal of Korea University Graduated School, (2006)
- J. H. Eom, S. H. Park, T. M. Chung, An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider, Journal of The Korea Institute of Information Security and Cryptology.(2010), Vol.20, No.5, pp.59-67.
- H. J. Jang, The Insurance Method of Respond Ability on Insider Cyber Threat, 2012 ROKAF Information& Communications Development International Seminar, (2012)
- Magklaras G.B, Furnell S.M., A preliminary model of end user sophistication for insider threat prediction in IT systems", Journal of Comput. Secur. (2004), Vol.24 No.5, pp.371-380.
- Shari Lawrence Pfleeger, Hunker J., Bulford, C., Insiders Behaving Badly: Addressing Bad Actors and Their Actions, IEEE Transaction on information forensics and security. (2010), Vol.5, No.1, pp.169-179. https://doi.org/10.1109/TIFS.2009.2039591
- Dawn Cappelli, Andrew Moore Randall Trzeciak, Timothy J. Shimeall, Common Sense Guide to Prevention and Detection of insider Threats, SEI Carnegie Mellon, (2009)
- Jinho Yoo, Sangho Jie, Jongin Lim, Estimating Direct Costs of Enterprises by Personal Information Security Breaches, , Korea Institute of Information Security & Cryptology (2009.08)