1 |
BSA Global Software Survey, "Software Management: Security Imperative, Business Opportunity," https://www.bsa.org/-/media/Files/StudiesDownload/2018_BSA_GSS_Report_en.pdf, Jun. 2018
|
2 |
Lee, Bum-Chul, Yang, Hee-Hee, and Byung-Sun Lee, "SDN / NFV / Cloud Trends", Electronic Telecommunications Trends Vol. 30, No. 1, pp.88-90, Feb. 2015
|
3 |
Seungwon Shin and Guofei Gu. "CloudWatcher:Network Security Monitoring Using Openflow in Dynamic Cloud Networks", Proceedings of the ICNP affiliated 7th Workshop on Secure Network Protocols(ICNP-NPSec), Oct. 2012
|
4 |
Alsmadi I.M. and AlEroud A., "SDN-Based Real-Time IDS/IPS Alerting System," Information Fusion for Cyber-Security Analytics, vol. 691, pp. 297-306, Oct. 2016.
DOI
|
5 |
Why hackers are targeting small businesses, ITWorld, http://www.itworld.co.kr/insight/91446, Jan. 16 2015(Oct. 17 2018)
|
6 |
'Gartner's Network Access Control Model', Gartner, Lawrence Orans, Aug. 2005
|