과제정보
연구 과제 주관 기관 : 정보통신 기술 진흥 센터
참고문헌
- National Information Security White Paper, Korea Internet Security Agency (KISA), 2016. (in Korean) [Online]. Available: http://isis.kisa.or.kr/ebook/download_pdf/2016.pdf
- C. H. Baek, "Control of Information Leakage Security, and Utilization of Digital Forensic," Deloitte Anjin Review, No. 3, Oct. 2014. (in Korean) [Online]. Available: https://www2.deloitte.com/content/dam/Deloitte/kr/Documents/insights/deloitte-anjin-review/03/kr_insights_deloitte-anjin-review-03_08.pdf
- Elastic Stack. [Online]. Available: https://www.elastic.co/kr/products
- W. T. Young, H. G. Goldberg, A. Memory, J. F. Sartain, and T. E. Senator, "Use of Domain Knowledge to Detect Insider Threats in Computer Activities," Security and Privacy Workshops (SPW), pp. 60-67, San Francisco, CA, USA, May 2013. DOI: 10.1109/SPW.2013.32
- H. Eldardiry, K. Sricharan, J. Liu, J. Hanley, B. Price, O. Brdiczka, and E. Bart, "Multi-source Fusion for Anomaly Detection : using Across-domain and Across-time Peer-group Consistency Checks," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 5, No. 2, pp. 39-58, 2014. DOI: 10.13140/2.1.3215.6802
- S. S. Hong, "[Technology Trends : SIEM] Evolve into an Intelligent Log Management Platform," CiOCiSO Magazine, Jan. 2016. (in Korean) [Online]. Available: http://www.ciociso.com/news/articleView.html?idxno=10993.
- S. J. Lee and D. H. Lee, "Real Time Predictive Analytic System Design and Implementation using Bigdata-log," Journal of The Korea Institute of information Security & Cryptology, Vol. 25, No. 6, pp. 1399-1410, 2015. https://doi.org/10.13089/JKIISC.2015.25.6.1399
- H. D. Kim, J. H. Kim, M. S. Park, S. H. Cho, and P. S. Kang, "Insider Threat Detection based on User behavior Model and Novelty Detection Algorithms," Journal of the Korean Institute of Industrial Engineers (KIIE), pp. 276-287, Aug. 2017.
- Tran Manh Thang and Juntae Kim, "The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters," International Conference on Information Science and Applications (ICISA 2011). Jeju Island, Korea, Apr. 26-29, 2011. DOI: 10.1109/ICISA.2011.577243.
- J. H. Sun, "Intelligent Intrusion Detection System Using Web Log and Database Log," Master Thesis, Department of Media at Graduate School of Computer & Information Technology in KOREA University, Feb. 2008. (in Korean)
- Querydsl, [Online]. Available: http://www.querydsl.com/
- Resrarch R&A Statistics Data, [Online]. Available:http://www.researchrna.com
- E. S. Kim, "A Study on Detection Model of Abnormal Signs Using User Logs - An Empirical Study of ERP System," Master Thesis, Department of Information Security at Graduate School of Information Security in Korea University, Feb. 2015. (in Korean)
- H. S. Shin, C. S. Park, "Development of a Chiller Model using Data Pre-processing and Random Forest," Master Thesis, Department of Convergence Engineering for Future City in Sungkyunkwan University, June 2016. (in Korean)
- Martin Ester, Hans-Peter Kriegel, Jorg Sander, and Xiaowei Xu, "A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise," Proc. of the Second International Conference on Knowledge Discovery and Data Mining (KDD'96), pp. 226-231, Portland, Oregon, August 02 - 04, 1996.
- I. Y. Lee, "Design and Implementation of Parallel ST-DBSCAN as In-database Analytics Function," Master Thesis, Department of Computer Science and Engineering at Graduate School in Seoul National University, Feb. 2017. (in Korean)
- Gengxin Chen, Saied A.Jaradat, Nila Banerjee, et. al., "Evaluation and Comparison of Clustering Algorithms in Analyzing ES Cell Gene Expression Data," Statistica Sinica, Vol. 12, pp. 241-262, 2002.
- A. R. Yoon, "Design and Implementation of Gene Expression Data Mining System using DBSCAN Algorithm," Master Thesis, Department of Computer Science & Engineering at Ewha Institute of Science and Technology in Ewha Womans University, Feb. 2004. (in Korean)