1 |
S. Garfinkel, G. Spafford, Practical UNIX and Interent Security, 2nd Ed. Oreilly & Associates Inc., pp.731-757, 2002. 11.
|
2 |
Hyundong Lee and Mokdong Chun, "Context-Aware Security System for Cloud Computing Environment", joural of the Institute of Electronics and Information Enginerrs, Vol.47 CI. pp.19-27. November 2010.
|
3 |
Moon-Goo Lee, "Secured Verification of Intrusion Prevention System Security Model Based on CPNs", joural of the Institute of Electronics and Information Enginerrs, Vol.48 CI. pp.76-81. May 2011.
|
4 |
Sunghee Woo, "A Study on Security Capability of IDPS", joural of the Institute of Electronics and Information Enginerrs, Vol.49 CI. pp.9-11. July 2012.
DOI
ScienceOn
|
5 |
H. Jang and S. Kim, "A Self-Extension Monitoring for Security Management," Proceeding of the 16th Annual Computer Security Applications Conference, pp.196-203, December 2000.
|