Browse > Article

Big Data and Enterprise Security 2.0  

Choi, Dae-Soo (이글루시큐리티)
Kim, Yong-Min (전남대학교)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 이성희, "Big Data의 이해-가치와 도입전략", 한국정보기술학회지, 제10권, 제1호, pp.63-68, 2011.
2 정용찬, "빅데이터 혁명과 미디어 정책이슈", 정보통신정책연구원, 2012.
3 IDG, "빅 데이터의 이해", IDG Tech Report, 2012.
4 McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", McKinsey & Company, 2011.
5 Ventana Research, "Using Big Data to Deliver Real-Time Insights for IT and the Business", 2011.
6 Splunk, "Splunk, Big Data and the Future of Security", White Paper, 2011.
7 이규재, "빅데이터를 위한 플랫폼들", http://helloworld.naver.com /helloworld/29533, 2012.
8 Michael Driscoll, "Building data startups: Fast, big, and focused", http://radar.oreilly.com/2011/08/building-data-startups.html, 2011.
9 Tom White, Hadoop Definitive Guide, O'Reilly Media, 2009.
10 HP, "Next-Generation Application Monitoring: Combining Application Security Monitoring and SIEM", White Paper, 2011.
11 남기효, 김윤홍, 권환우, "최신 정보보호기술 동향: APT 및 그 대응", 주간기술동향, pp.14-25, 2011.
12 Help Net Security, "The next step in BYOD Security", http://www.net-security.org/article.php?id=1700, 2012.
13 Neil Roiter, "Next-generation firewalls: In depth", http://www.csoonline.com/article/691651/next-generationfirewalls- in-depth, 2011.
14 Martignoni, L., Stinson, E., Fredrikson, M., Jha, S. and Mitchell, J., "A Layered Architecture for Detecting Malicious Behaviors", RAID, 2008.
15 R. Koch, "Towards Next-Generation Intrusion Detection", 3th Inter-national Conference on Cyber Conflict, pp.151-168, 2011.
16 Wei-Yu Chen, and Jazz Wang, "Building a Cloud Computing Analysis System for Intrusion Detection System", CLOUD SLAM, 2009.
17 최대수, 문길종, 김용민, 노봉남, "MapReduce를 이용한 대용량 보안로그 분석", 한국정보기술학회 논문지, 제9권, 제8호, pp.125-131, 2011.