1 |
M. J. Lee, "Internet & Information Security:Big Data and the Utilization of Public Data", KISA, PP. 47-64, 2011
|
2 |
hyun seok jeong, "A Study on the Application of Cloud Computing in the 4th Industrial Revolution", Korean Institute of Communications and Information Sciences, Vol. 44, No. 6, pp. 1213-1222, 2019, DOI:10.7840/kics.2019.44.6.1213
DOI
|
3 |
Amazon AWS, https://aws.amazon.com/ko/
|
4 |
Mocrosoft Azure, https://azure.microsoft.com/ko-kr/
|
5 |
Cloud Services Information Protection Guide, KISA, pp. 1-98, 2011
|
6 |
Cloud Computing Issues and Status, KEIT, pp. 1-48, 2011
|
7 |
Cloud Computing, https://en.wikipedia.org/wiki/Cloud_computing
|
8 |
Jihye Shin, "Regulations and the standard form contract for the user protection on the cloud computing service", HUFS Law Review, Vol. 40, No. 4 pp.117-140, 2016, DOI : 10.17257/hufslr.2016.40.4.117
DOI
|
9 |
"Top Threats to Cloud Computing Plus: Industry Insights", Cloud Security Alliance, Dec. 2017
|
10 |
Vyas, Giriraj, Sanjay Meena, and Pramendra Kumar. "Intrusion Detection Systems: A Modern Investigation." International Journal of Engineering, Management & Sciences (IJEMS) Vol. 1, No. 11, 2014.
|
11 |
Alpaydin, "Ethem. Introduction to machine learning", MIT press, 2020.
|
12 |
Patric R. Nicolas, "Scala for Machine Learning", Packt Publishing Ltd, Dec. 2015,
|
13 |
Contreras, Javier, et al. "ARIMA models to predict next-day electricity prices." IEEE transactions on power systems, Vol. 18, No. 3, pp.1014-1020. 2003, DOI: 10.1109/TPWRS.2002.804943
DOI
|
14 |
Yin-Goo Yim, Hyun-Wook Jin,."Analysis of Impact of Multi-core CPU Bandwidth in Docker Containers", KIISE Transactions on Computing Practices, Vol. 24, No. 12, pp.675-680, 2018, DOI: 10.5626/ktcp.2018.24.12.675
DOI
|
15 |
D. Merkel, "Docker: Lightweight Linux Containers for Consistent Development and Deployment", Journal of Linux Journal 2014, Vol. 2014, No. 239, pp. 2, May. 2014.
|
16 |
STRESS, https://www.cyberciti.biz/faq/stress-test-linux-unix-server-with-stress-ng/
|