1 |
중소기술정보진흥원, '중소기업 정보화 역기능 실태조사 연구', 2004
|
2 |
한국정보보호진흥원, '정보화 역기능 실태조사 연구', 2004
|
3 |
Bishop, M., 'A Taxonomy of UNIX System and Network Vulnerabilities', Technical Report CSE-95-10, Purdue University, 1995
|
4 |
Howard, J. D., 'An Analysis of Security Incidents on the Internet', Ph. D Thesis, Carnegie Mellon University, 1997
|
5 |
한국게임산업진흥원, '2005년 대한민국 게임백서', 2005
|
6 |
한국정보보호진흥원, '정보화 역기능 실태조사 연구', 2003
|
7 |
Bisbey, II R, Hollingworth D., 'Protection Analysis: Final Report', University of Southern California, 1978
|
8 |
Ray, Hunt and Simon, Hansman, 'A Taxonomy of Network and Computer Attacks', Computer & Security, Vol.24, No.1, 2005
|
9 |
Bishop, M. and D. Bailey, 'A Critical Analysis of Vulnerability Taxonomies', Technical Report CSE-96-11, Dept. of Computer Science, University of California at Davis, 1996
|
10 |
Aslam, T., 'A Taxonomy of Security Faults in the Unix Operating System', Master's Thesis, Purdue University, 1995
|
11 |
Brian, Marick, 'A Survey of Software Fault Surveys', Technical Report UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, 1990
|
12 |
Eugene, H. Spafford, 'Common System Vulnerabilities', Proceedings of the Workshop on Future Directions in Computer Misuse and Anomaly Detection, 1992
|
13 |
Abbott, R. P., J. S. Chin, J. E. Donnelley, W. L. Konigsford, S. Tokubo, and D. A. Webb, 'Security Analysis and Enhancements of Computer Operating Systems', Institute for Computer Sciences and Technology, National Bureau of Standards, 1976
|
14 |
Rajeev Nagar, 'Windows NT File System Internals: A Developer's Guide', O'Reilly & Associates, 1997
|
15 |
Wenliang, Du and Aditya, P. Mathur, 'Categorization of Software Errors that led to Security Breaches', In Proceeding of the 21st National Information Systems Security Conference (NISSC'98), 1998
|
16 |
정윤경, 기준백, 천정희, '온라인 게임 아이템의 안전한 전자 거래 시스템', 한국정보보호학회논문지, 제13권, 제3호, 2003
|
17 |
Lough, D. L., 'A Taxonomy of Computer Attacks with Applications to Wireless Networks', Ph. D. Thesis, Virginia Polytechnic Institute and State University, 2001
|
18 |
Peltier, T., 'Information Security Risk Analysis', Auerbach, 2001
|
19 |
Otwell, K. and B. Aldridge, 'The Role of Vulnerability in Risk Management', IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, 1989
|