References
- C. S. Pyo, H, Y. Yong, N. S. Kim & H. C. Bang. (2013). IoT(M2M) Technology Trends and Prospects. Journal of the Korean Institute of Communication Sciences (Information and Communication), 30(8), 3-10.
- J. H. Jeon, H. G. Hong, W. S. Lee & H. J. Kim. (2015). Open Source Things Internet (OSIoT) Trends and Forecasts. Journal of the Korean Institute of Communication Sciences (Information and Communication), 32 (5), 23-30.
- H. S. Jang, H. J. Kim, & T. S. Son. (2015). A Study on Cyber Security Issues in Industrial IoT Environment. Journal of Information Security, 25(5), 12-17.
- H. M. Lee & D. K. Shin. (2015). Open Software Platform Design for the Internet. Proceedings of the Korea Information Science Society Conference, 1492-1494.
- H. K. Lee, M. H. Kim & H. C. Bang. (2014). Feature: Internet: Things Internet technology trends and development direction. Journal of Korea Institute of Information Scientists and Engineers 21-2: 14-21.
- Y. G. Hong, M. K Shin & H. J. Kim. (2013). Standardization trend of internet (IoT / M2M). OSIA Standards & Technology Review, 26 (2), 8-17.
- D. H. Kim, S. W. Yoon & Y. P. Lee. (2013). Security or IoT services. Journal of the Korean Institute of Communication Sciences (Information and Communication), 30(8), 53-59.
- J. H. Seo, Y. S. Min & Y K. Park. (2015). Technical analysis for software protection. Journal of Information Technology, 13(1), 33-39.
- S. M. You. (2015). Government Policy Direction for Software Copyright Protection. Journal of Information Technology, 13(1), 41-47.
- J. S, Lee, S. K. Chang & I. H. Cho. (2014). Hardware based security for Internet of Things (IoT) security. Proceedings of the Fall Conference of the Korean Society for Internet Information, 241-242.
- J. S. Choi & H. W. Kim. (2013). IoT security technology trend.
- ITU Internet Reports. (2005). Internet of Things, ITU
- ITU-T Y.2060, (2012). Overview of the Internet of Things.
- A. Wright. (2009). Cyber security for the power grid: cyber security issues & Securing control systems, ACM CCS.
- J. S. Choi & H. W. Kim. (2013). IoT security technology trend. Table 1, 2814
- BILL WEINBERG, Open Source and the Internet of Things: Roles, Reach and Rationale for Deploying OSS, http://rtcmagazine.com/articles/view/105734
- B. I. Kim. (2009). Open source license violations and copyright infringement. Quarterly copyright.
- H. R. Reddy. (2009). Jacobsen v. Katzer: the Federal Circuit weighs in on the enforceability of free and open source software licenses. Berkeley Tech. LJ, 24, 299.
- Y. C. Kim, S. C. Hwang & J. Y. Choi. (2005). Program similarity evaluation algorithm." Journal of the Internet Information Science Society. 51-64.
- N. J. Park & G. J. Ahn. (2010). Privacy Protection in Smart Grid. Journal of information security, 20(3), 62-78.
- H. J. Seo, D. K. Kim, J. H. Kim, J. S. Choi & H. W. Kim. (2014). Feature: Internet of Things: Security and Privacy Protection on the Internet. Journal of Information Processing, 21(2), 48-60.
- S. W. Cha. (2014). Big Data Protection of the environment and privacy. IT and Law Studies, 8, 193-259.
- Y. S. Son & J. H. Park. (2015). Home IoT technology status and development direction. Journal of the Korean Institute of Communication Sciences (Information and Communication), 32(4), 23-28.
- S. H. Lee & Y. Y. Cho. (2015). A Study on the Strengthening of National Cyber Security in the Internet Age. Political Information Research, 18 (2), 1-30.
- H. S. Chang, H. J. Kim & T. S. Son. (2015). A Study on Cyber Security Issues in Industrial IoT Environment." Journal of information security 25.5: 12-17.
- http://www.ddaily.co.kr/news/article.html?no=137711 Digital Daily, (2016)
- Y. L. Lee & J. S. Kim. (2014). Personal Information Protection Framework in IoT Environment. Korea Contents Association 2014 Fall Conference, 277-278.
- S. S. Kim. (1996). Introduction to Computer Science, Hongneung Science Publishing.: 183-216.
- Oracle America, Inc. v. Google Inc., 2014 WL 1855277 (Fed. Cir. May 9, 2014).
- Y. E. Kim, Y. J. Lee & W. G.2013). Program Plagiarism Checking Method by Class Structure Graph Comparison. Journal of the Korea Contents Association, 13 (11), 37-47. https://doi.org/10.5392/JKCA.2013.13.11.037
- C. Roy & J. Cordy. (2007). A Survey on Software Clone Detection Research, Technical Report 541, Queen's University at Kingston.
- S. Narayanan & S. Simi. (2012). Source Code Plagiarism Detection and Performance Analysis Using Fingerprint Based Distance Measure Method. 2012 7th International Conference on Computer Science & Education, 1065-1068.
- J. Ji, G. Woo & H. Cho. (2007). A Source Code Linearization Technique for Detecting Plagiarized Programs. ACM SIGCSE Bulletin 39(3),, 73-77. https://doi.org/10.1145/1269900.1268807
- C. Liu, C. Chen, J. Han, & P. Yu, (2006). GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis," Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, .872-881.
- S. O. Yoon. (2013). A Study on Risk Classification of Big Data. Journal of the Korean Association of Local Information, 16(2), 93-122.
- J. J. Kim. (1997). Computer General, Hong Jin Publishing Co., Ltd pp196
- & S.Y. Yuk.(2003) Patentability of computer programs. Comparative Judgment 1.2:481-511.
- Supreme Court precedent 1996.08.23, 95DO2785
- Supreme Court precedent 2001. 05. 15, 98DO732
- Seoul High Court case 1999.04.07, 98. 23616
- Seoul case law support for East1998. 4.NA 13. Sentence 96KAHAP 1921 verdict
- Seoul case law support for East 1997.11.28, 95GAHAP 11403
- Supreme Court precedent 2002.06.28, 2001DO2900
- Seoul High Court 1996.10.11, 96NA1353
- Supreme Court precedent 2002.12.26, 2000DA.13757
- Seoul District Court Copy 1997.01.10. 96NO7508 / Supreme Court 1997.07.22. 97DO764/Supreme Court 1997.05.30. 97DO766 /Supreme Court 1997.05.23. 97DO767 /Supreme Court 1997.06.13. 97DO768 Computer program protection law
- Supreme Court precedent 1998.03.13, 97DA45259
- Supreme Court precedent 2000.11.10, 98DA60590
- Seoul High Court case 1993.06.18, 92NA64646 / Seoul District Court 1993.04.22, 92GAHAP31298
- J. Holler, V. Tsiatsis, C. Mulligan, S. Avesand, S. Karnouskos & D. Boyle. (2014). From Machineto- machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press.
- J. E. Cohen & M. A. Lemley. (2001). Patent scope and innovation in the software industry. California Law Review, 1-57.
- T. H. Goo. (2005). Technical Characteristics of Computer Programs and Patent and Copyright Protection. 13.
- J. Bessen & E. Maskin. (2009). Sequential innovation, patents, and imitation. The RAND Journal of Economics, 40(4), 611-635. https://doi.org/10.1111/j.1756-2171.2009.00081.x
- S. J. Oh & H. W. Lee. (2013). Copyright Law 3rd Edition, Park Young-sa, 873
- http://it.donga.com/23161/ITDONGHAS.WLee 2015.12.03.
- Y. C. Kim, S. C. Hwang & J. Y. Choi. (2005). Program similarity evaluation algorithm. Journal of the Internet Information Science Society, 6(1), 51-64.
- Y. E. Kim, Y. J. Lee & W. G.(2013). Program Plagiarism Checking Method by Class Structure Graph Comparison. Journal of the Korea Contents Association, 13(11), 37-47. https://doi.org/10.5392/JKCA.2013.13.11.037
- B. Y. Lee, J. T. Lim & J. S. Yoo. (2013). Utilization of social media analysis technique using big data. Journal of the Korea Contents Association, 13(2), 211-219. https://doi.org/10.5392/JKCA.2013.13.02.211
- S. H. Lee & K. W. Shin. (2018). Area-efficient design of SHA-256 hash processors for IoT security. The Journal of the Korea Information and Communications Society, 22(1), 109-116.
- H. E. Moon, J. Y, Sung, H. S. Lee, K .I, Jang, K. Y. Kwak & S. T. Woo. (2018). Detection of attack group using malware and packer detection. Journal of the Korean Institute of Information Scientists and Engineers, 45(2), 106-112.
- H. S. Yang. (2017). A Study on the Security Quality Evaluation Method of Smart Healthcare System. Digital fusion research, 15(11), 251-259.
- Y. C. Ahn, Y. H. Shin, G. H. Lee. (2015). A Study on the countermeasure against BLE based ZEP system attack technique using the fusion of Big Data platform and monitoring system. Digital fusion research, 13(8), 331-336.