References
- Checkpoint, "Achieving Fifth Generation Cyber Security, A Survey Research Report of IT and Security Professionals", Mar 2018.
- Hee-Jae Park, Yu-Na Kim, Jong Kim, "Network Security Appliance", The Korean Institute of Information Scientists and Engineers, Vol 19, No. 2, pp. 48-58, Dec 2005.
- IDC, "Asia/Pacific Quarterly Security Appliance Tracker",https://www.idc.com/tracker/showproductinfo.jsp?prod_id=109
- Kaspersky, https://www.kaspersky.com/resource-center/definitions/utm
- Gartner, https://www.gartner.com/it-glossary/unified-threat-management-utm
- Gartner, https://www.gartner.com/it-glossary/next-generation-firewalls-ngfws
- IDC, "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in 2016, According to IDC", Mar 2016.
- IDC, "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in Q2 2017, According to IDC", Sep 2017.
- IDC, "UTM and Firewall Growth Drive the Worldwide Security Appliance Market Expansion in Q2 2018, According to IDC", Sep 2018.
- IDC, "Top 5 Vendors, Worldwide Security Appliance Revenue & Growth", Jun 2018.
- Mun-Su Choi, Min-Cheol Kim, "Korea IT Security Products Forecast, 2016-2020", IDC Report, 2016.
- Gartner, "Magic Quadrant for Unified Threat Management", Jun 2017.
- Fortinet, https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/Fortinet_Product_Matrix.pdf
- CheckPoint 3200 Security Gateway, https://www.checkpoint.com/downloads/product-related/datasheets/ds-3200-appliance.pdf
- Sophos SG Series, https://www.sophos.com/en-us/medialibrary/pdfs/factsheets/sophos-sg-series-appliances-brna.pdf
- Cisco ASA Firepower 2100, 4100 Series, https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw/datasheet-c78-736661.html
- SonicWall Network Security appliance NSa) series, https://www.sonicwall.com/SonicWall.com/files/17/177b1c66-ae9f-4448-9ebf-c829e1acf3bf.pdf
- Ahlab, Ahnlab TrustGuard Series, https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=10
- SECUI, SECUI MF2, https://www.secui.com/product/mf2
- NexG, NexG VForce UTM Series, https://www.nexg.net/products/network-security/vforce-utm/#tab-3
- Wins, Wins Sniper UTM/FW Series, http://www.wins21.co.kr/product/product_030101.html?num=14
- Hoyoung Hwang, Seung-Cheon Kim, "Design and Implementation of Unified Network Security System support for Traffic", International Journal of Internet, Broadcasting and Communication, Vol. 11, No. 6, pp.267-273, Dec 2011.
- Kyung-Shin Kim, "Security Analysis and Improvement of Integrated Security Management System", International Journal of Internet, Broadcasting and Communication, Vol. 15, No. 1, pp.15-23, Feb 2015. DOI: 10.7236/JIIBC.2015.15.1.15
- Dae-Cheol Shin, Hong-Yoon Kim, "Implementation of abnormal behavior detection Algorithm and Optimizing the performance of Algorithm", Journal of the Korea Academia-Industrial cooperation Society, Vol. 11, No. 11, pp. 4553-4562, 2010. DOI: 10.5762/KAIS.2010.11.11.4553
- Hyun-Seok Kim, Dong-Gue Park, "Implementation of Abnormal Behavior Detection System based Packet Analysis for Industrial Control System Security", Journal of the Korea Academia-Industrial cooperation Society, Vol. 19, No. 4, pp. 47-56, Apr 2018. https://doi.org/10.5762/KAIS.2018.19.4.47