1 |
KISA, "2016 internet and information security top ten issues outlook", Dec. 2015
|
2 |
Shin Yeong-Sang, "Hypervisor-based virtualization security technology trend in the cloud environment", Jul. 2014
|
3 |
DDaily, 2010, http://www.ddaily.co.kr/news/article.html?no=67684
|
4 |
Mariano Graziano, Corrado Leita, Davide Balzarotti, "Towards Network Containment in Malware Analysis Systems", ACSAC '12 Proceedings of the 28th Annual Computer Security Applications Conference, pp.339-348, Dec. 2012
|
5 |
H. Binsalleeh, T.Ormerod, A. Boukhtouta et al., "On the Analysis of the Zeus Botnet Crimeware Toolkit", Eighth Annual International Conference on Privacy, Security and Trust, Aug. 2010
|
6 |
Baek Seung-Hun, "Open vSwitch packet processing structure", PIOLINK, Mar. 2015
|
7 |
http://openvswitch.org/releases/NEWS-2.5.0
|
8 |
Justin Pettit, Thomas Graf, "Stateful Connection Tracking & Stateful NAT", Nov. 2014
|
9 |
Laheeb Mohammed Ibrahim, Karam H. Thanon, "Analysis and Detection of the Zeus Botnet Crimeware", International Journal of Computer Science and Information Security, Vol. 13, No. 9, Sep. 2015
|
10 |
A-Young Son, Eui-Nam Huh, "A Study on migration for QoS in cloud computing", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, Jan. 2016
|
11 |
Babak Yadegari, Brian Johannesmeyer, Benjamin Whitely et al., "A Generic Approach to Automatic Deobfuscation of Executable Code" 2015 IEEE Symposium on Security and Privacy, May. 2015
|
12 |
AhnLab, 2016, http://www.ahnlab.com/kr/site/product/cloudMss.do
|