1 |
Minsoo Park, Jumin Park, Hyungheon Kim and Yoojae Won, "User Identification Method Using Input Pattern Analysis", The Korean Society Of Computer And Information Conference, 25(1), pp. 213-216, Jan. 2017.
|
2 |
de Vet, J.M, et al. "Impacts of the COVID19 pandemic on EU industries" Publication for the committee on Industry, Research and Energy, Policy Department for Economic, Scientific and Quality of Life Policies, European Parliament, Luxembourg, Mar. 2021.
|
3 |
Scoot Rose, Oliver Borchert, Stu Mitchel and Sean Connelly, "Zero Trust Architecture", NIST SP 800-207, Aug. 2020.
|
4 |
Wikipedia, "Software Defined Perimeter", https://en.wikipedia.org/wiki/Software_Defined_Perimeter, May 2021
|
5 |
Jason Garbis and Juanita Koilpillai, "Software-Defined Perimeter ARCHITECTURE GUIDE," Cloud Security Alliance, Jul. 2019.
|
6 |
Abdallah Moubayed, Ahmed Refaey and Abdallah Shami, "Software- Defined Perimeter(SDP): State of the Art Secure Solution for Modern Networks," IEEE Network, 33(5), pp. 226-233, Sep. 2019.
DOI
|
7 |
T. David and D. Robert, "Support vector data description", Machine Learning, vol.54, nol.1, pp. 45-66, Jan. 2004.
DOI
|
8 |
BrentBilger, Alan Boehme, Bob Flores, Zvi Guterman, Mark Hoover, Michaela lorga, Junaid Islam, Marc Kolenko, Juanita Koilpilla, Gabor Lengyel, Gram Ludlow, Ted Schroeder and Jeff Schweitzer, "SDP_Specification 1.0," Cloud Security Alliance, Apr. 2014.
|
9 |
Dong-Hyun Yu, Yong-Uk Kim, Young-Jae Ha and Yeon-Seung Ryu, "Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era" Jonornal of The Korea Conergence Society, vol. 12, No.1, pp. 1-9, Jan. 2012.
|
10 |
John Kidervag, "No More Chewy Centers: Introducing The Zero Trust Model Of Information Security," FORRESTER, Sep. 2010.
|
11 |
Mun-Kweon Jeong, Seong-Ho An and Kihyo Nam, "SVDD-Based Fianacial Fraud Detection MethodThrough Respective Learnings of Normal/Abnormal Behaviors," International Journal of Security and Its Applications, vol.10, No.3, pp. 429-436, Mar. 2016.
DOI
|
12 |
Kyeong-Jin Sa, Jae-Yeon Woo and Heung-Youl Youm, "Behavior-based biometric authentication available for multi-factor authentication", KIISC review, 26(6), pp. 51-57, Dec. 2016
|
13 |
J. H. Park, "Effective Normalization Method for Fraud Detection Using a Decision Tree", Jounal of the Korea Institute of Information Security & Cryptology, vol. 25, no. 1, pp. 133-146, Feb. 2015.
DOI
|