1 |
The 12th Conference of Defense Privacy and password Defense Security Command, pp. 34-61, pp. 113-124, 2014. 11. 07.
|
2 |
Four nemon Against Cybercrime scale embodied in expense reports. 2014.
|
3 |
Sung Jin Ahn, Kyung Ho Lee, Won Hyung Park. Study of Security Control pp183-245. 2013. 05.
|
4 |
NSHC 3.20 cyberterrorism incident reports, 2013.
|
5 |
NSHC 6.25 Cyber Terrorism Analysis Report, 2013.
|
6 |
CERT Insider Threat Center(2011). Insider Threat Control : Using a SIEM signature to detect potential precursors to IT Sabotage. 2011.
|
7 |
Jung Ho Eom, Sung Soo Choi, Tae Myung Jung, Introduction of Cyber Warfare, pp31-106, 2012.
|
8 |
Sang Yong Choi, Reconstruction of hacking incidents, pp. 287-324, 2013, 07.
|
9 |
Dae Woo Park, Theory of Network security, 2009.
|
10 |
Dae Woo Park, Jung Man Seo. "Research of Security method for TCP/IP attack", Journal of the Korea Computer Information Association, Vol. 10, No. 5 pp. 217-226. 2005, 11. 30.
|
11 |
Hoon Bae Gil, "A Study on Security Policy about PC communication", Master's thesis Graduate School of Polytechnic, Yonsei University, 1996.
|
12 |
CERT/Coordination Center, "CSIRT Frequently Asked Questions," Pittsburgh, Pa.:CMU/SEI, 2007.
|
13 |
Tae Myung Jung, CERT's functions and roles, education in course of operating CERT, 2002.
|
14 |
Internet Security / Web Hacking domestic hacking case http://www.ahnlab.com 2014. 05. 09.
|
15 |
Cuvepia Profile New Leader of Integrated Security Solution www.cuvepia.com(2013.04).
|