Context cognition technology through integrated cyber security context analysis |
Nam, Seung-Soo
(Dept. of conversions Science, Konj-Ju National University)
Seo, Chang-Ho (Dept. of conversions Science, Konj-Ju National University) Lee, Joo-Young (Network Security Research Team, ETRI) Kim, Jong-Hyun (Network Security Research Team, ETRI) Kim, Ik-Kyun (Network Security Research Team, ETRI) |
1 | NIS, MSIP, KCC, MOSPA, KISA, NSRI, "2013 National Information Security White Paper," Apr. 2013. |
2 | Tankard, Colin. "Advanced Persistent threats and how to monitor and deter them" Network security, pp.16-19, 2011. |
3 | http://www.microsoft.com/ko-kr/security/default.aspx |
4 | http://www.igloosec.co.kr/ |
5 | www.inzenss.com |
6 | M. O'neil, "Unix System in a Large Enterprise Environment - Axent ESM", SANS Institute Information Security Reading Room, 22 June 2001. |
7 | A. Sinha, A. Wang, and A. Chandrakasan, "Algorithmic Transforms for Efficient Energy Scalable Computation", Proc. of ISLPED, 2000. |
8 | K. Srinivasan, et al., iDedup: Latency-aware, inline data deduplication for primary storage, USENIX FAST 2012. |