1 |
James D. Murray "Windows NT Event Logging" O'Reilly, newton.ma.us, pp. 105, Sep. 1998
|
2 |
D. Y. Ha, "The analysis procedures for Hacking damages(Win NT/2000)," CERTCC-KR , pp. 4-7, Apr. 2001
|
3 |
Y. S. Kim, "Automation of Sewage Treatment Facilities by DCS," Monthly journal of automation systems, pp. 115-116, Jan. 1997
|
4 |
J. O. Kwon, Y. J. Hong, "A study on the security management plan of ICS," Samsung SDS Journal of IT Services Vol.8/No.2, pp. 114-115, Sep. 2011
|
5 |
The Japan Society Of Automation, "The opening and security problems for DCS," Automation System, v.26, pp. 52-57, Aug. 2010
|
6 |
Matt Tani "DOE Focuses on Cyber Security" Transmission & Distribution World, pp. 97, Mar. 2007
|
7 |
Y. S. Jang, "Report of Nessus analysis," CERTCC-KR, pp. 5, Jul. 2001
|
8 |
H. K. Kim, K. H. Im, and S. C. Park, "DSS for computer security incident response applying CBR and collaborative response," Expert Systems with Applications, Vol 37, Issue 1, pp. 852-870, Jan. 2010
DOI
ScienceOn
|