1 |
Gwang-Hyun Kim, "Implementation and Design of Proxy System for Web vulnerability Analysis", JKIECS, Vol. 9, No. 9, pp. 1011-1018, 2014
|
2 |
Kim ChinGo, "(A)study on the verification of improved security vulnerability when building website", Master Thesis, Graduate School of Namseoul University, 2014
|
3 |
Jae-Chan Moon, Seong-Je Cho, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development," JKSCI, Vol.17, No. 2, pp. 127-137, 2012
|
4 |
Mi-Young Park, Hyen-Woo Seung, Yang-mi Lim, "The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization," JKSII, Vol. 14, No. 3, pp. 23-33, 2013
|
5 |
Sunghyuck Hong, "Vulnerability of Directory List and Countermeasures," Journal of Digital Convergence, Vol. 12, No. 10, pp. 259-264, 2014
DOI
|
6 |
Do-Yeon Kim, "Vulnerability Analysis for Industrial Control System Cyber Security," JKIECS, Vol. 9, No. 1, pp. 137-142, 2013
|
7 |
Dong-Jin Kim, Sung-Je Cho, "An Analysis of Domestic and Foreign Security Vulnerability Management Systems based on a National Vulnerability Database," Internet and Inormation Security, Vol. 1, No. 2, pp. 130-147, 2011
|
8 |
Young-Gi Min, Kab-Seung Ko, "A Designed of Virtual Machine Security Vulnerability Detection Tool in a Cloud Computing Environment," Journal of Security Engineering, Vol. 9, No. 6, pp. 519-530, 2012
|
9 |
Jin-Seok Yang, Tai-Myoung Chung, "An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment," KIPS Tr. Comp. and Comm. Sys., Vol. 3, No. 1, pp. 23-30, 2014
DOI
|
10 |
Woo-Sung Chun, Dea-Woo Park, "A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service" JKIICE, Vol. 16, No. 6, pp. 1217-1222, 2012
|
11 |
Jang Seung-Ju, "Implementation of User Account Vulnerability Checking Function System using MS-SQL Database," JKIICE, Vol. 18, No. 10, pp. 2482-2488, 2014
|
12 |
Ji Hong Kim, Huy Kang Kim, "Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis," JKIISC, Vol. 22, No. 5, pp.1079-1090, 2012
|
13 |
http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?seq=18181
|