References
- Baek, J. and Park, D., "A Study on Traceback by WAS Bypass Access Query Information of DataBase", Journal of Korea society of Computer and Information, Vol. 14, No. 12, 2009, pp. 181-190.
- Daniel Joseph Barry, Understanding Packet Loss in Network Monitoring and Analysis Appliances, Retrived from https://esj.com/Articles/2012/12/13/Understanding-Packet-Loss.aspx?Page=2.
- Eckerson, W. W., "Three tier client/server architectures : achieving scalability, performance, and efficiency in client/server applications", Open Information Systems, Vol. 3, 1995, pp. 46-50.
- Kim, H., "WhiteList SQL based database access control on web application server", Korea University, 2014.
- Korea Data Agency, Data Industry White Paper. 2016.
- Korea Financial Telecommunications and Clearins Institute, An analysis of DB security tecknology and status, 2007.
- Mark Lillywhite, Agent vs Aentless : WHAT TO USE AND WHEN, Retrived from https://www.snowsoftware.com/int/blog/2017/03/23/agents-vs-agentless-what-use-and-when.
- Song, U., and Park, K., "Homomorphic Encryption for database outsourcing", Journal of the Korea Institute of Inform, Vol. 19, No. 3, 2009, pp. 80-89.
- Stephen, J. B., How to choose the right server performance monitoring tools, Retrieved from, http://searchitoperations.techtar. get.com/tip/How-to-choose-the-right-server-performance-monitoring-tools.
- UpGuard, Agent vs Agentless and Why We Chose Agentless. Retrived from https://www.upguard.com/blog/agent-vs-agentless-and-why-we-chose-agentless.