References
- J. H. Kim and H. J. Kim, "Prevention of information leakage and privacy violation," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 21, No. 5, pp. 45-49, Aug. 2011.
- A. B. Garba, J. Armarego, D. Murray and W. Kenworthy, "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
- M. S. Kim and D. W. Kang, "Information leakage prevention system design for small business," Feb. 2008.
- J. Y. Lee and S. Y. Kang, "Design and Verification of the Integrated Log Analysis System for Enterprise Information Security," Journal of Digital Contents Society, Vol. 9 No. 3, pp. 491-498, Sept. 2008.
- K. S. Yu, S. H. Im and H. B. KIM, "Technology trend and development direction of integrated log management system," Korea Institute Of Information Security And Cryptology, Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 90-99, Dec. 2013.
- S. J. Park and J. I. Lim, "A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, pp. 637-644, Jun. 2012.
- D. S. Kim and S. R. Kim, "A Study on Monitoring Method about Information Leakage Sign using Application Log," Journal of Korean Institute of Information Technology, pp. 83-91, 2013
- M. B. Hyun and S. J. Lee, "The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 369-375, Apr. 2016. https://doi.org/10.13089/JKIISC.2016.26.2.369
- Y. H. Kim and E. N. Huh, "Personalized Analysis System for Enterprise Log Data Analysis," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp. 1149-1150, Jun. 2014.
- S. H. Yoon, "Study on the Technical Security Factor for the Implementation of Secure DB System," The Korean Society Of Computer And Information, Journal of the Korea Society of Computer and Information, Vol. 19, No. 12, pp. 143-152, Dec. 2014. https://doi.org/10.9708/jksci.2014.19.12.143
- C. J. Ryu, M. H. Han and S. J. Han, "Design of Log Management System based on Document Database for Big Data Management," The Korea Institute of Information and Communication Engineering, Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 11, pp. 2629-2636, Nov. 2015. https://doi.org/10.6109/jkiice.2015.19.11.2629
- Y. H. Kim and E. N. Huh, "Log Analysis Supporting System based on Log Data for Efficient Big Data Analysis," KOREA INFORMATION SCIENCE SOCIETY, Journal of the Korea information science society, pp. 936-938, Dec. 2014.
- J. H. Kim, J. I. Lim and H. K. Kim, "Collaborative security response by interworking between multiple security solutions," Korea Institute Of Information Security And Cryptology, Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, NO. 1, pp. 69-79, Fev. 2013. https://doi.org/10.13089/JKIISC.2013.23.1.069
- K. M. Ahn, J. Y. Lee, D. M. Yang and B. H. Lee, "Design and Implementation of a Hadoop-based Efficient Security Log Analysis System," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 8, pp. 1797-1804, Aug. 2015. https://doi.org/10.6109/jkiice.2015.19.8.1797