Browse > Article

네트워크 보안 기술 동향과 전망  

Kim, Bong-Hyeon (경남대학교)
Jo, Dong-Uk (충북도립대학교)
Publication Information
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 T. Ma, On the Security of A Novel Elliptic Curve Dynamic Access Control System, IJSIA Vol.3 No.1, 2009.
2 F. Alkhateeb, A. M. Manasrah and A. R. Bsoul, Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies, IJSIA Vol.6 No.4, 2012.
3 E. Hooper, Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service, IJSIA Vol.1 No.1, 2007.
4 Khairallah, Michael, Security System Design And Implementation Guide : The Design and Implementation of Electronic Security Systems, Butterworth-Heinemann, 2005.
5 J. Y. Kang, Phishing/Pharming Examples and Countermeasure Analysis, Journal of Information Science Society, 2013.
6 Market Trends and Forecast for Firewall and IP Virtual Private Network Equipment: Worldwide, 2001-2006," Market Trend, Gartner, Oct. 2002.
7 C. Kaufman, et al., "Code-preserving simplifications and improvements to IKE", draft-kaufman-ipsecimproveike- 00.txt, 2001.
8 H. Ould-Brahim, et al., "Network based IP VPN Architecture using Virtual Routers", draft-ietfppvpn- vr-00.txt, 2001.
9 OMA, "Service and Content Protection for Mobile Broadcast Services," 2007.
10 OMA, "Mobile Broadcast Services - XML Schema for OMA DRM 2.0 Extensions for BCAST(XBS),"2007.
11 Curtin-Mestre K., Room S., Yngve S., "Privacy Concern with Adopting DLP Technology," RSA Conference Europe, 2009.
12 G. Y. Kim, A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure, Journal of the Institute of Electronics Engineers, Vol.50 No.2, 2013.
13 A. Belenky, N. Ansari, On IP Traceback IEEE Communication Magazine, vol. 41, pp. 142 - 153, July 2003.
14 Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, Practical Network Support for IP Traceback, Technical Report UW-CSE-00-02-01, Department of Computer Science and Engineering, University of Washington, Seattle.
15 Korean Internet & Security Agency, KISA Report, 2012.
16 B. G. Kyoun, A study on the improvement of the computer security incident management, ungkyunkwan Univ. A Master's Degree Paper, 2011.
17 D. G. Song, Hacking Infringement Accidents Analysis, Ji&Son Publishers, Korea, 2009.
18 KISA, 2007년 국내 정보보호산업 시장 및 동향 조사, 2008.
19 Korean Intellectual Property Office(KIPO), (http:// www.kipo.go.kr/)
20 KISA, Trends report monthly malicious code detection of concealed site, 2012.
21 KISA, Trends and analysis monthly of internet infringement accidents, 2012.
22 IDC Korea, IDC Market Analysis: Korea Security Software 2008-2012.
23 McAfee Threats Report: Third Quarter, 2012.