1 |
C. S. Jung and Y. C. Kim, "A study on system tracing user activities in the windows operating system", Journal of the Korea Institute of Information Security & Cryptology, Vol. 21, No. 8, pp. 101-114, Aug. 2011.
과학기술학회마을
|
2 |
Korea Internet Security Agency (KISA), Information Security Statistics [Internet]. Available: http://isis.kisa.or.kr/sub07/?pageId=070500
|
3 |
The Board of Audit and Inspection of Korea(BAI) [Internet]. Available: http://www.bai.go.kr/HPBKAudResultOpenAction.do?method=detailData&SEQ_NO=1642&PAGE=1&CYBER_PUHE_YN=Y&AUD_YEAR_NO=2014081&TASK_TYPE=KP1
|
4 |
Microsoft.[MS-SHLLIK] Shell Link (.LNK) Binary File Format. [Internet]. Available: http://msdn.microsoft.com/en-us/library/dd871305.aspx
|
5 |
H. Carvey, Windows Registry Forensics: Advanced Digital Foernsic Analysis of the Windows Registry, Burlington, NJ: Syngressmedia, 2011
|
6 |
T. H. Kang and J. I, Lim "A study on consigned party management system enhancement for personal information protection," Journal of The Korea Institute of Information Security & Cryptology, Vol 23, No. 4, pp. 781-797, Aug. 2013.
과학기술학회마을
DOI
|
7 |
C. H. Lee, "Study on digital investigation model for privacy acts in Korea", Journal of the Korea Navigation Institute, Vol. 15, No. 6, pp. 1212-1219, Dec. 2011.
과학기술학회마을
|