1 |
Mark S. Kadrich, "Endpoint Security", Addision-Wesley, 2007.
|
2 |
Karen O'Donoghue, "Network Access Control", Interop Labs, May 2006.
|
3 |
Joseph Steinberg, Tim Speed, J. Steinberg, T. Speed, "SSL VPN: Understanding, evaluating and planning secure, web-based remote access", Packt Publishing, 2005.
|
4 |
"Anyclick NAC Technology Paper", UNET System, 2006.
|
5 |
Lawrence Orans, "Gartner's Network Access Control Model", Gartner, August 2005.
|
6 |
Eun-Gyeom Jang, "A study on block-based recovery of damaged digital forensic evidence image", Springer MTA, March, 2012.
|
7 |
Nam-Youl Park, Yong-Min Kim, Bong-Nam Noh, "A Behavior based Detection for Malicious Code Using Obfuscation Technique", KIISC, Vol. 16, No. 3, June. 2006.
과학기술학회마을
|
8 |
Eun-Gyeom Jang, "A Study on Comparison of Road Surface Images to Provide Information on Specific Road Conditions", KSCI, Vol. 17. No. 4, April. 2012.
과학기술학회마을
DOI
ScienceOn
|
9 |
Hyo-Nam Kim, Jae-Kyoung Park, Yoo-Hun Won, "A Study on the Malware Realtime Analysis Systems Using the Finite Automata", KSCI, Vol. 18. No. 5, May. 2003.
과학기술학회마을
DOI
ScienceOn
|