1 |
J.-H. Sim, J.-K. Jung, H.-J. Kim, I.-K. Kim, and T.-M. Chung, "Survey on the recent advanced persistent threat solutions," in Proc. KICS Conf., pp. 769-770, Nov. 2013.
|
2 |
T. Mustafa, "Malicious data leak prevention and purposeful evasion attacks: An approach to advanced persistent threat (APT) management," in SIECPC, pp. 27-30, Apr. 2013.
|
3 |
Y.-H. Kim and W. H. Park, "A study on cyber threat prediction based on intrusion detection event for APT attack detection," Multimedia Tools and Applications, vol. 71, no. 2, pp. 685-698, Jul. 2014.
DOI
ScienceOn
|
4 |
Russel Miller, "Advanced persistent threats: Defending from the inside out," CATechnologies, Jul. 2012.
|
5 |
S.-C. Goh, A study of APTs(advanced persistent threat) penetration detect for security operation data and big data, National Security Research Institute, vol. 2014, no. 022, Oct. 2014.
|
6 |
S.-H. Lee and M.-S. Han, Study of defense method through APT(Advanced Persistent Threat) penetration path analysis in Industrial Network-Focusing on Stuxnet Case-, Korean Association for Industrial Security, Dec. 2014.
|
7 |
K.-H. Kim and M.-J. Choi, "Linear SVM-based android malware detection and feature selection for performance improvement," J. KICS, vol. 39C, no. 8, pp. 738-745, 2014.
DOI
|
8 |
M. Kim, "Security analysis and enhancement of tsai et al.'s smart-card based authentication scheme," J. KICS, vol. 39B no. 1, pp. 29-37 2014.
DOI
|
9 |
J. Lee, J. Park, S. W. Jung, and S. Jung, "The authentication and key management method based on PUF for secure USB," J. KICS, vol. 38B no. 12, pp. 944-953, 2014.
|