1 |
Young-jin Kim, Su-yeon Lee, Hun-young Kwon, and Jong-in Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.19, No.1, pp.103-111, Feb., 2009.
|
2 |
Korea Internet & Security Agency, "INTERNET & SECURITY FOCUS," Aug., 2013.
|
3 |
Hyun-do Lee and Sang-jin Lee, "A Study on development of evaluation indicators on the Managed Security," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.22, No.5, pp.1133-1143, Oct., 2012.
|
4 |
Ja-young Oh, "What's Managed Security Service," boannews, Dec., 2006.
|
5 |
Woo-jong Suh, Dae-seok Kang, Yong-won Kang, and Jin-won Hong, "A Competency Analysis Methodology for Improving the Productivity of IT Human Resources," The Journal of Productivity, Vol.22, No.1, pp.69-91, Feb., 2008.
DOI
|
6 |
Wan-suk Yi, Woong Go, Dong-ho Won, and Jin Kwak, "Development of S-SLA's Grading Indicator based on the Analyses of IPS's Security Functions," Jonornal of The Korea Institute of Information Security & Cryptology, Vol.20, No.6, pp.221-235, Dec., 2010.
|
7 |
Korea Software Industry Association [Internet], http://www.sw.or.kr/.
|
8 |
Hyun-jeong Cho, "IPS, the future network security product," Journal of Computing Science and Engineering, Vol.23, No.1, pp.21-26, Jan., 2005.
|
9 |
Young-su Jang, "Sofeware security vulnerability improvement using open static analysis tool," Korea Unviersity, Feb., 2011.
|
10 |
Alberto Dainotti, Antonio Pescape, and Giorgio Ventre, "A Packet-level Characterization Of Network Traffic," CAMAD, pp.38-45, June, 2006.
|
11 |
Ministry of the Interior [Internet], http://www.moi.go.kr/, Oct., 2014.
|
12 |
Joong-gil Park, "Methodology of Analyze the Risk Using Method of Determinated Quantity," The Journal of Information Processing System, Vol.13, No.7, pp.851-858, Dec., 2006.
|
13 |
The Open Web Application Security Project(OWASP) Project Handbook 2013 [Internet], http://owasp.org/, Oct., 2012.
|
14 |
Jin-kook Kim, Jung-heum Park, and Sang-jin Lee, "A Framework for Data Recovery and Analysis from Digital Forensics Point of View," Journal of Information Processing Systems, Vol.17, No.5, pp.391-398, Oct., 2010.
|
15 |
Jae-Chan Moon and Seong-je Cho, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development," Jonornal of Korea Society of Computer, Vol.17, No.2, pp.127-137, Feb., 2012.
|
16 |
Chae-tae Im, Joo-hyung Oh, and Hyun-cheol Jeong, "Study of Technical Trends and Analysis Method of Recent Malware," Journal of Computing Science and Engineering, Vol.28, No.11, pp.117-126, Nov., 2010.
|
17 |
Noh Ung-rae congressman [Internet], http://blog.naver.com/with_wraenoh/220480698919, Sep., 2015.
|