Acknowledgement
This paper was supported by RESEARCH FUND offered from Catholic University of Pusan(2018)
References
- Telecommunications Technology Association, "Next Generation Security," in ICT Standardization Strategic Map, pp. 305-313.
- Institute of Information & Communications Technology Planning & Evaluation, "Intelligent Car Security Threats and Countermeasures Report," pp. 28-30, 2017.
- Korea Internet & Security Agency. [Internet]. Available: https://www.kisa.or.kr/business/gdpr/gdpr_tab1.jsp.
- Check Point. "Step Up to Gen V Cyber Security," [Internet]. Available: https://www.checkpoint.com, 2019.
- Gartner, "Hype Cycle for Risk Management," [Internet]. Available: https://www.gartner.com, 2018.
- Institute of Information & Communications Technology Planning & Evaluation, "ICT Technology Level Survey Report," pp. 154-155, pp.167-174, 2018.
- D. S. Lee, "The Trends of Next Generation Cyber Security Technology," in Weekly ICT Trends, Institute of Information & Communications Technology Planning & Evaluation Pub., pp. 2-15, 2019.
Cited by
- 빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구 vol.20, pp.4, 2019, https://doi.org/10.33778/kcsa.2020.20.4.027