1 |
T. Ma, On the Security of A Novel Elliptic Curve Dynamic Access Control System, IJSIA Vol.3 No.1, 2009.
|
2 |
F. Alkhateeb, A. M. Manasrah and A. R. Bsoul, Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies, IJSIA Vol.6 No.4, 2012.
|
3 |
E. Hooper, Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service, IJSIA Vol.1 No.1, 2007.
|
4 |
Khairallah, Michael, Security System Design And Implementation Guide : The Design and Implementation of Electronic Security Systems, Butterworth-Heinemann, 2005.
|
5 |
J. Y. Kang, Phishing/Pharming Examples and Countermeasure Analysis, Journal of Information Science Society, 2013.
|
6 |
Market Trends and Forecast for Firewall and IP Virtual Private Network Equipment: Worldwide, 2001-2006," Market Trend, Gartner, Oct. 2002.
|
7 |
C. Kaufman, et al., "Code-preserving simplifications and improvements to IKE", draft-kaufman-ipsecimproveike- 00.txt, 2001.
|
8 |
H. Ould-Brahim, et al., "Network based IP VPN Architecture using Virtual Routers", draft-ietfppvpn- vr-00.txt, 2001.
|
9 |
OMA, "Service and Content Protection for Mobile Broadcast Services," 2007.
|
10 |
OMA, "Mobile Broadcast Services - XML Schema for OMA DRM 2.0 Extensions for BCAST(XBS),"2007.
|
11 |
Curtin-Mestre K., Room S., Yngve S., "Privacy Concern with Adopting DLP Technology," RSA Conference Europe, 2009.
|
12 |
G. Y. Kim, A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure, Journal of the Institute of Electronics Engineers, Vol.50 No.2, 2013.
|
13 |
A. Belenky, N. Ansari, On IP Traceback IEEE Communication Magazine, vol. 41, pp. 142 - 153, July 2003.
|
14 |
Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, Practical Network Support for IP Traceback, Technical Report UW-CSE-00-02-01, Department of Computer Science and Engineering, University of Washington, Seattle.
|
15 |
Korean Internet & Security Agency, KISA Report, 2012.
|
16 |
B. G. Kyoun, A study on the improvement of the computer security incident management, ungkyunkwan Univ. A Master's Degree Paper, 2011.
|
17 |
D. G. Song, Hacking Infringement Accidents Analysis, Ji&Son Publishers, Korea, 2009.
|
18 |
KISA, 2007년 국내 정보보호산업 시장 및 동향 조사, 2008.
|
19 |
Korean Intellectual Property Office(KIPO), (http:// www.kipo.go.kr/)
|
20 |
KISA, Trends report monthly malicious code detection of concealed site, 2012.
|
21 |
KISA, Trends and analysis monthly of internet infringement accidents, 2012.
|
22 |
IDC Korea, IDC Market Analysis: Korea Security Software 2008-2012.
|
23 |
McAfee Threats Report: Third Quarter, 2012.
|