1 |
Lee Gyu An, Park Dae Woo, ShinYongtae, "a forensic investigation to secure the integrity of the data link management methods in the field," Journal of the Korea Society of Computer and Information, 2006
|
2 |
Prosecutor's Office, "maintaining the integrity of digital evidence procedures and facilities for the study," Prosecutor's Office, if Personal Web Media
|
3 |
Takhuiseong two, "Digital Forensic Research Workshop jeonge report, if 46 to 48
|
4 |
Luoma. V., Forensics and electronic discovery: The new management challenge, Computer & Security, 25(2), 91-96, 2006
DOI
ScienceOn
|
5 |
ParkDaeWoo, SeoJeongMan. "TCP / IP securitymethods for attacks," Journal of the Korea Society of Computer and Information Science,Volume10, Issue5,pp217-226,2005.11.30
|
6 |
Park Dae woo, Im Seung Rin. "Hacker attacks prevention systemfor the intelligent study of linkage", the Korea Society of Computer and Information, Volume 11, Issue 2, pp44-50, 2006.5.31.
|
7 |
Park Hyoung Bae, Korea Wireless Internet Standardization Forum ", TTA Journal No.121, 2009.
|
8 |
KimKi-young, gangdongho, "openmobile environment in the smartphone security technology," Information Security Issue Volume 19, Issue 5, page (s): 10-104, 2009
|
9 |
ParkKiHong, JangHaesook. "Mobile Forensics Android Log Cat filtering for research," Proceedings of the Summer Conference of the Korea Society of Computer and Information.2012 pp217-219
|
10 |
ChoJongKeun, HaSangEun, "Effective Scheme for File Search Engine inMobile Environments", The Korea Contents Society, Vol.8 No.11, pp41-48, 2008
DOI
|