References
- Ministry of the Interior [Internet], http://www.moi.go.kr/, Oct., 2014.
- Young-jin Kim, Su-yeon Lee, Hun-young Kwon, and Jong-in Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.19, No.1, pp.103-111, Feb., 2009.
- Korea Internet & Security Agency, "INTERNET & SECURITY FOCUS," Aug., 2013.
- Hyun-do Lee and Sang-jin Lee, "A Study on development of evaluation indicators on the Managed Security," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.22, No.5, pp.1133-1143, Oct., 2012.
- Ja-young Oh, "What's Managed Security Service," boannews, Dec., 2006.
- Woo-jong Suh, Dae-seok Kang, Yong-won Kang, and Jin-won Hong, "A Competency Analysis Methodology for Improving the Productivity of IT Human Resources," The Journal of Productivity, Vol.22, No.1, pp.69-91, Feb., 2008. https://doi.org/10.15843/kpapr.22.1.200802.69
- Wan-suk Yi, Woong Go, Dong-ho Won, and Jin Kwak, "Development of S-SLA's Grading Indicator based on the Analyses of IPS's Security Functions," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.20, No.6, pp.221-235, Dec., 2010.
- Korea Software Industry Association [Internet], http://www.sw.or.kr/.
- Hyun-jeong Cho, "IPS, the future network security product," Journal of Computing Science and Engineering, Vol.23, No.1, pp.21-26, Jan., 2005.
- Young-su Jang, "Sofeware security vulnerability improvement using open static analysis tool," Korea Unviersity, Feb., 2011.
- Alberto Dainotti, Antonio Pescape, and Giorgio Ventre, "A Packet-level Characterization Of Network Traffic," CAMAD, pp.38-45, June, 2006.
- Joong-gil Park, "Methodology of Analyze the Risk Using Method of Determinated Quantity," The Journal of Information Processing System, Vol.13, No.7, pp.851-858, Dec., 2006.
- The Open Web Application Security Project(OWASP) Project Handbook 2013 [Internet], http://owasp.org/, Oct., 2012.
- Jin-kook Kim, Jung-heum Park, and Sang-jin Lee, "A Framework for Data Recovery and Analysis from Digital Forensics Point of View," Journal of Information Processing Systems, Vol.17, No.5, pp.391-398, Oct., 2010.
- Jae-Chan Moon and Seong-je Cho, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development," Jonornal of Korea Society of Computer, Vol.17, No.2, pp.127-137, Feb., 2012.
- Chae-tae Im, Joo-hyung Oh, and Hyun-cheol Jeong, "Study of Technical Trends and Analysis Method of Recent Malware," Journal of Computing Science and Engineering, Vol.28, No.11, pp.117-126, Nov., 2010.
- Noh Ung-rae congressman [Internet], http://blog.naver.com/with_wraenoh/220480698919, Sep., 2015.