Browse > Article

사용자 상황인지 기반 네트워크 보안 구조 연구  

LEE, SORA (성균관대학교)
Ko, Sangjun (성균관대학교)
Cho, Geumhwan (성균관대학교)
Kim, Soyoung (성균관대학교)
Kim, Eunsoo (성균관대학교)
KO, HOON (성균관대학교)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Berker Agir, Jean-Paul Calbimonte and Karl Aberer, "Semantic and Sensitivity Aware Location Privacy Protection for the Internet of Things," PrivOn'14 Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, Vol. 1316, pp. 58-63.
2 Dwork, Cynthia, and Aaron Roth. "The algorithmic foundations of differential privacy." Foundations and Trends in Theoretical Computer Science 9.3-4 (2014): 211-407.
3 Vishal M. Patel, Rama Chellappa, Deepak Chandra, and Brandon Barbello, "Continuous user authentication on mobile devices: Recent progress and remaining challenges." IEEE Signal Processing Magazine 33.4 (2016): 49-61.   DOI
4 "SIEM: A Market Snapshot," Dr. Dobb's Journal, Feb. 2007.
5 J. Hayes, "Cybersecurity and the Big Yellow Elephant,"Cloudera Vision Blog, May 2015.
6 K. M. Kavanagh, O. Rochford, and T. Bussa,"Magic Quadrant for Security Information and Event Management,"Gartner, Aug. 2016.
7 Bhatt, P. K. Manadhata, and L. Zomlot, "The operational role of security information and event management systems," IEEE Security & Privacy, vol. 12, no. 5, 2014.
8 "Google 2-Step Verification," Google, retrieved at 2016-11-30.https://www.google.com/landing/2 step/
9 "Two-factor authentication for Apple ID," Apple, retrieved at 2016-11-30, https://support.apple.com/en-us/HT204915
10 Gibler, Clint, et al. "AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale." International Conference on Trust and Trustworthy Computing. Springer Berlin Heidelberg, 2012.
11 Kapadia, Apu, David Kotz, and Nikos Triandopoulos. "Opportunistic sensing: Security challenges for the new paradigm." 2009 First International Communication Systems and Networks and Workshops. IEEE, 2009.
12 H. Witte, C. Rathgeb and C. Busch, "Context-Aware Mobile Biometric Authentication based on Support Vector Machines," 2013 Fourth International Conference on Emerging Security Technologies, Cambridge, 2013, pp. 29-32.
13 T. Gisby, ""Soft" Sensors Are Breaking Into Four Major Industries,"Aug 2015.
14 Shi, Weidong, et al. "Senguard: Passive user identification on smartphones using multiple sensors." 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2011.
15 Juefei-Xu, Felix, et al. "Gait-id on the move: pace independent human identification using cell phone accelerometer dynamics." Biometrics: Theory, Applications and Systems (BTAS), 2012 IEEE Fifth International Conference on. IEEE, 2012.
16 Feng, Tao, et al. "Continuous mobile authentication using touchscreen gestures." Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012.
17 Vishal M. Patel, Rama Chellappa, Deepak Chandra, and Brandon Barbello, "Continuous user authentication on mobile devices: Recent progress and remaining challenges." IEEE Signal Processing Magazine 33.4 (2016): 49-61.   DOI
18 Araújo, Lívia CF, et al. "User authentication through typing biometrics features." IEEE Transactions on Signal Processing 53.2 (2005): 851-855.   DOI
19 Berker Agir, Jean-Paul Calbimonte and Karl Aberer, "Semantic and Sensitivity Aware Location Privacy Protection for the Internet of Things," PrivOn'14 Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, Vol. 1316, pp. 58-63.
20 Dwork, Cynthia, and Aaron Roth. "The algorithmic foundations of differential privacy." Foundations and Trends in Theoretical Computer Science 9.3-4 (2014): 211-407.
21 Santos, Nuno, et al. "Using ARM TrustZone to build a trusted language runtime for mobile applications." ACM SIGARCH Computer Architecture News. Vol. 42. No. 1. ACM, 2014.