1 |
Suprema, Introduction of Bio Star Lite, Technical Columns, http://supremainc.com, June 2001
|
2 |
McAfee, Security Advice: Threat Meter Levels, http://home.mcafee.com
|
3 |
Symantec Corporation, DeepSight Threat Management System, http://www.symantec.com/security_response/threatconlearn.jsp
|
4 |
AhnLab, Security Alert, http://ahnlab.co.kr
|
5 |
Korea Emergency Response Team Coordination Center, KrCERT Internet Threat http://www.krcert.or.kr/kor/main/main.jsp
|
6 |
DVTtel Inc, Intelligent Video System Technology, DVTEL White Paper, http://info.dvtel.com/WhitePaper.html, 2006
|
7 |
B. Shin, "Study on Technical trend of physical security and future service, " Journal of the Korea Industrial Information System Society, Vol. 15, No. 5, pp. 159-166, Dec. 2009.
|
8 |
J. Kim, G. Kim, and Y. Lee, "The Concept and Approach of the Converged Security, " Review of Korean Institute of Information Security and Cryptology, Vol. 19, No. 6, pp. 68-73, Dec. 2009.
|
9 |
Y. Mehdizadeh, "Convergence of Logical and Physical Security, " SANS Institute InfoSec Reading Room, 2010. 12.
|
10 |
K. Kang, D. Kang, J. Na, and I. Kim, "Utilization of Physical Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security, " Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 553-564, June 2012.
|
11 |
J. Han, and H. Jo, "Technical Trends of Image Security System, " Review of Korean Institute of Information Security and Cryptology, Vol. 9, No. 5, pp. 29-37, Oct. 2009.
|
12 |
Y. An, "Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards" Journal of the Korea Society of Computer and Information, Vol. 17, No. 2, pp. 159-166, Feb. 2012.
|
13 |
T.L. Saaty, and L.G. Vargas, "Prediction Projection and Forecasting" Kluwer Academic Publishers, 1991.
|
14 |
D.A. Kravitz, and B. Martin, "Ringelmann rediscovered: The original article" Journal of Personality and Social Psychology, Vol. 50, No. 5, pp. 936-941, May 1986.
DOI
|