1 |
Dong-jin Kim, Sung-je Cho, "An Analysis of Domestic and Foreign Security Vulnerability Management Systems based on a National Vulnerability Database," Internet and Information Security, vol. 1, no. 2, pp. 130-147, Nov. 2010.
|
2 |
Han-eul Ryu, Tae-kyu Kim, Wan-soo Cho, "Method of Standard Dataset based Vulnerability Database Design for Constructive Modeling & Simulation," Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 1346-1347, Jun. 2017.
|
3 |
Gu Yun-hua, Li Pei, "Design and Research on Vulnerability Database," 2010 Third International Conference on Information and Computing, vol. 2, pp. 209-212, Jun. 2010.
|
4 |
Yu-kyong Kim, Seung-cheol Shin, Joon-seon Ahn, Ouk-seh Lee, Eun-young Lee, Hwan-soo Han, "Analysis and Documentation of Korean Common Weakness Enumeration for Software Security," Communications of the Korean Institute of Information Scientists and Engineers, vol. 28, no. 2, pp. 20-31, Feb. 2010.
|
5 |
Yung-Yu Chang, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, "Trend Analysis of the CVE for Software Vulnerability Management," 2011 IEEE Third International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, pp. 1290-1293, Oct. 2011.
|
6 |
Su Zhang, Xlnmlng OU, Dolna Caragea, "Predicting Cyber Risks through National Vulnerability Database," Information Security Journal : A Global Perspective, pp. 194-206, Nov. 2015.
|
7 |
Jeong-hoon Hyun, Hyoung-joong Kim, "Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack," Journal of Digital Contents Society, vol. 19, no. 1, pp. 181-191, Jan. 2018.
DOI
|
8 |
Jin-guk Um, Hun-yeong Kwon, "Model Proposal for Detection Method of Cyber Attack using SIEM," The Journal of The Institute of Internet, Broadcasting and Communication, vol. 16, no. 6, pp. 43-54, Dec. 2016.
DOI
|
9 |
Sang-duck Cho, "A Study of Security Monitoring Enhancement by Using Security Vulnerability diagnosis," Konkuk University, Feb. 2014.
|
10 |
In-seok Jeon, Keun-hee Han, Dong-won Kim, Jin-yung Choi, "Using the SIEM Software vulnerability detection model proposed," Journal of the Korea Institute of Information Security & Cryptology, vol. 25, no. 4, pp. 961-974, Aug. 2015.
DOI
|
11 |
Jae-heon Lee, Sang-jin Lee, "A Study on Effective Security Control Model Based on Characteristic of Web Service," Journal of the Korea Institute of Information Security & Cryptology, vol. 29, no. 1, pp. 175-185, Feb. 2019.
DOI
|