참고문헌
- Choi, H. Y. and Jeong, H. C. (2015). Multivariate time series modeling for information security data, Journal of the Korean Data Analysis Society, 17, 1309-1318.
- Jeong, H. C. (2010). Study on AHP and non-parametric verification on the importance of the diagnosis indicators of personal information security level, Journal of the Korean Data Analysis Society, 12, 1499-1510.
- Jeong, H. C. (2012). A study on Korea domain registration forecasting, Journal of the Korean Data Analysis Society, 14, 1889-1898.
- Jeong, H. C. (2013). A development of spam score card using the data mining method, Journal of the Korean Data Analysis Society, 15, 697-707.
- Jeong, H. C., Lee, J. C., and Jhun, M. (2012). A study for obtaining weights in pairwise comparison matrix in AHP, The Korean Journal of Applied Statistics, 25, 531-541. https://doi.org/10.5351/KJAS.2012.25.3.531
- Lee, J. C., Jhun, M., and Jeong, H. C. (2014). A statistical testing of the consistency index in analytic hierarchy process, The Korean Journal of Applied Statistics, 27, 103-114. https://doi.org/10.5351/KJAS.2014.27.1.103
- KISA (2010). The Study on the Public Publication Promotion related to the Information Security, Korea Internet & Security Agency.
- KISA (2011). Survey for Information Security Industry in Korea, Korea Internet & Security Agency.
- KISA (2012). Internet Security Focus, Statistics, Korea Internet & Security Agency, Available from: http://www.kisa.or.kr/public/library/
- Saaty, T. L. (1980). The Analytic Hierarchy Process, McGraw-Hill, New York.
- Saaty, T. L. (2003). Decision-making with the AHP: Why is the principle eigenvector necessary, European Journal of Operational Research, 145, 85-91. https://doi.org/10.1016/S0377-2217(02)00227-8
- Venables, W. N., Smith, D. M., and The R Development Core Team (2010). An Introduction to R, Available from: http://cran.r-project.org/