1 |
Gi-Hyouk Lee and Cheol-Gyu Lee. "A Study on the Construction of Leak Prevention System through Analysis of Internal Information Leak Symptom." Journal of The Korea Institute of Information Security & Cryptology, 19(3). pp. 70-79. Jun. 2009
|
2 |
National Industrial Security Center, http://service12.nis.go.kr
|
3 |
Hyun-Tak Chae, "Security policy proposals through PC security solution log analysis : prevention leakage of personal information," master's thesis, Korea University, Feb. 2015.
|
4 |
Jung-Ho Eom, "The Quantitative Evaluation of a Level of Insider Activity using SFI Analysis Techniques," Journal of security engineering, 10(2), pp. 113-122, Apr. 2013
|
5 |
Kwang-Woo Lee and Seung-Joo Kim. "Analysis of Trends in Digital Multifunction Device Security Technology from the Viewpoint of Preventing and Protecting Business Confidential Information." Journal of The Korea Institute of Information Security & Cryptology, 20(1). pp. 47-55. Feb. 2010
|
6 |
Gui-Young Jung, "A Study on the Effective User Anomaly Detection Method through Integrated Security Log Analysis," master's thesis, Yonsei University, Feb. 2017.
|
7 |
Jang-Su Park and Im-Yeong Lee, "Information Security : Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario," KIPS Transactions on Computer and Communication Systems, 4(2), pp. 65-72, Feb. 2015
DOI
|
8 |
Eun-Seon Kim, "A Study on the Anomaly Detection using User Log : ERP System An Empirical Study," master's thesis, Korea University, Feb. 2015.
|
9 |
Jae-Hyouk Choi, "A Study on A Scenarios Development Guideline for Detecting Security Threats," master's thesis, Korea National Open University, Feb. 2016.
|
10 |
Won-Gi Lim, Koo-Hyung Kwon, Jung-Jae Kim, Jong-Eon Lee and Si-Ho Cha, "Comparison and Analysis of Anomaly Detection Methods for Detecting Data Exfiltration," Journal of Korea Academia-Industrial cooperation Society, 17(9), pp. 440-446, Sep. 2016
DOI
|
11 |
Dong-Wook Ha, Ki-Tae Kang and Yeong-Seung Ryu, "Detecting Insider Threat Based on Machine Learning : Anomaly Detection Using RNN Autoencoder," Journal of The Korea Institute of Information Security & Cryptology, 27(4), pp. 763-773, Aug. 2017
DOI
|
12 |
Sung-Man Park and Choong-Kyo Jeong, "Enterprise Data Loss Prevention Using Behavior-Based Outlier Detection," Proceedings of Symposium of the Korean Institute of Communications and Information Sciences, pp. 94-95, Nov. 2016
|
13 |
Kwon-Ill Kim and Byoung-Tak Zhang, "Hybrid Product of Experts Model and Learning Algorithm for Anomaly Detection," Proceedings of Conference of the Korean Institute of Information Scientists and Engineers, pp. 1553-1555, Jun. 2013
|