1 |
Richard C. Brackney, Robert H. Anderson, "Understanding the Insider Threat," RAND, 2005.
|
2 |
Marcus A. Maloof외 1인, "ELICT: A System for Detecting Insiders Who Violate Need-toknow," RAID(Recent Advances in Intrusion Detection) 2007, pp. 146-166.
|
3 |
Ted E. Senator 외 26인, "Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity," ACM SIGKDD, 2013, pp. 1393-1401.
|
4 |
William T. Young 외 4인, "Use of Domain Knowledge to Detect Insider Threats in Computer Activities," IEEE Security and Privacy Workshops, 2013, pp. 60-67.
|
5 |
김태현 ․ 최승원, "SDR 시스템에서 GPU를 사용한 Lattice Reduction-aided 검출기 구현," 디지털산업정보학회, 제8권 4호, 2012, pp.91-98.
|
6 |
고장혁. 이동호, "국방정보시스템 성능향상을 위한 효율적인 GPU 적용방안 연구," 디지털산업 정보학회, 제11권 제1호, 2015, pp.27-35.
|
7 |
고장혁 ․ 임원기, "네트워크 트래픽 분석을 통한 행위기반 분석기술 연구," 한국군사과학기술학회, 종합학술대회, 2016, pp. 1291-1292.
|
8 |
Richard Bejtlich, "Practice of Network Security Monitoring," 2013.
|
9 |
Nutan Farah Haq 외 5인, "Application of Machine Learning Approaches in Intrusion Detection System: A Survey," International Journal of Advanced Research in Artificial Intelligence, Vol. 4, No.3, 2015, pp. 9-18.
|
10 |
Jeffrey Cleveland 외 3인, "Scalable Machine Learning Framework for Behavior-Based Access Control," Resilent Control Systems (ISRCS), 2013 6th International Symposium, pp 181-185.
|