1 |
지식경제부, '보안 OS기반 SOX 대응 내부통제 시스템 개발', 티에스온넷(주), 2009.
|
2 |
Splunk Inc., White paper: Splunk for Security, 2011.
|
3 |
ArcSight Inc., White paper: Using Advanced Event Correlation to improve Enterprise Security, Compliance and Business Posture, 2011.
|
4 |
Wipro Technologies, White paper: Understanding Event Correlation and the Need for Security Information management, 2011.
|
5 |
박태규, 임연호, "커널 기반의 보안 리눅스 운영체제 구현", 정보보호학회, 2001.
|
6 |
Definition of Normalization. Web site http://www.dmreview.com/glossary/n.html
|
7 |
김성락, "상호연관성 분석을 이용한 웹서버 보안관리 시스템", 한국컴퓨터정보학회 논문지, 2004.
|
8 |
황현욱, 김민수, 노봉남, "감사로그 상관관계를 통한 호스트기반의 침입탐지시스템", 정보보호학회 논문지, 2003.6.
|
9 |
Definition of correlation. Web site http://www.ojp.usdoj.gov/BJA/evaluation/glossary/glossary_c.htm
|
10 |
netIQ John Q, W.2001. White Paper. Security event correlation: Where are we now? Electronic version found at Development," Communications of the ACM, 40, pp. 71-79, May 1997.
|
11 |
Robert Rinnan, "Benefits of Centralized Log file Correlation", Gjovik University College, 2005.
|
12 |
Forte, DV.2004. The "art of log correlation". http://www.infosecsa.co. za /proceedings2004/006.pdf
|
13 |
Cristina Abad et al, "Log correlation for intrusion detection: A proof of concept", 19th Annual Computer Security Applications Conference, Las Vegas, 2003.
|