1 |
J. H. Lee, J. S. Park, S. W. Jung, and S. Jung, "The authentication and key management method based on PUF for secure USB," J. KICS, vol. 38B, no. 12, pp. 944-953, 2013.
과학기술학회마을
DOI
ScienceOn
|
2 |
W. S. Seo and M. S. Jun "The management and security plans of a separated virtualization infringement type learning database using VM (virtual machine)," J. KICS, vol. 36, no. 8, pp. 947-953, 2011.
과학기술학회마을
DOI
ScienceOn
|
3 |
P.-H. Jo, J.-I. Lim, and H.-K. Kim "A study on improvement of security vulnerabilities in intelligent transport system," J. The Korea Inst. Inf. Security & Cryptology(JKIISC), vol. 23, no. 3, pp. 531-543, 2013.
DOI
ScienceOn
|
4 |
D.-J. Kim and S.-J. Cho "An analysis of domestic and foreign security vulnerability management systems based on a national vulnerability database," Internet lnf. Security, vol. 1, no. 2, pp. 130- 147, 2010.
|
5 |
I.-Y. Mun and S.-M. Oh "Vulnerability analyzers for the mobile application the design and implementation," J. Korea Multimedia Soc., vol. 14, no. 10, pp. 1335-1347, Oct. 2011.
DOI
ScienceOn
|
6 |
S.-M. Yang and J. S. Park "An efficient access control mechanism for secure surveillance systems," J. KICS, vol. 39B, no. 4, pp. 228-233, 2014.
과학기술학회마을
DOI
ScienceOn
|
7 |
J.-S. Park, M.-H. Park, and S.-H. Jung "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013.
과학기술학회마을
DOI
ScienceOn
|
8 |
H.-U. Yoo, J.-H. Yun, and T.-S. Shon "Whitelist-based anomaly detection for industrial control system security," J. KICS, vol. 38B, no. 8, pp. 641-653, 2013.
과학기술학회마을
DOI
ScienceOn
|
9 |
Y.-H. Lee, J. H. Kang, and S. J. Lee "A specification-based intrusion detection mechanism for LEACH protocol," J. KICS, vol. 37B, no. 2, pp. 138-147, 2012.
과학기술학회마을
DOI
ScienceOn
|
10 |
J. S. Kim, DB security for the protection of personal information(2006), Retrieved Dec., 10, 2013, from http://blog.naver.com/mybrainz/150007657976
|
11 |
Wikipedia vulnerability(2012), Retrieved Dec. 12, 2013, from http://ko.wikipedia.org/
|
12 |
DB Vulnerability Analysis Summary, Retrieved Dec. 20, 2013, from www.DBGuide.net
|
13 |
Listener(2009), Retrieved Dec., 2, 2013, from http://www.netbuysell.co.kr/global_asp/board/board_view.asp?Codeno=5&K_no=359&Pgtype=A
|
14 |
S. H. Lee, Y. J. Maeng, D. H. Nyang, and K. H. Lee, "Possibility of disclosure of user information in internet explorer," J. KICS, vol. 38B, no. 12, pp. 937-943, 2013.
과학기술학회마을
DOI
ScienceOn
|