1 |
이성희, "Big Data의 이해-가치와 도입전략", 한국정보기술학회지, 제10권, 제1호, pp.63-68, 2011.
|
2 |
정용찬, "빅데이터 혁명과 미디어 정책이슈", 정보통신정책연구원, 2012.
|
3 |
IDG, "빅 데이터의 이해", IDG Tech Report, 2012.
|
4 |
McKinsey Global Institute, "Big data : The next frontier for innovation, competition, and productivity", McKinsey & Company, 2011.
|
5 |
Ventana Research, "Using Big Data to Deliver Real-Time Insights for IT and the Business", 2011.
|
6 |
Splunk, "Splunk, Big Data and the Future of Security", White Paper, 2011.
|
7 |
이규재, "빅데이터를 위한 플랫폼들", http://helloworld.naver.com /helloworld/29533, 2012.
|
8 |
Michael Driscoll, "Building data startups: Fast, big, and focused", http://radar.oreilly.com/2011/08/building-data-startups.html, 2011.
|
9 |
Tom White, Hadoop Definitive Guide, O'Reilly Media, 2009.
|
10 |
HP, "Next-Generation Application Monitoring: Combining Application Security Monitoring and SIEM", White Paper, 2011.
|
11 |
남기효, 김윤홍, 권환우, "최신 정보보호기술 동향: APT 및 그 대응", 주간기술동향, pp.14-25, 2011.
|
12 |
Help Net Security, "The next step in BYOD Security", http://www.net-security.org/article.php?id=1700, 2012.
|
13 |
Neil Roiter, "Next-generation firewalls: In depth", http://www.csoonline.com/article/691651/next-generationfirewalls- in-depth, 2011.
|
14 |
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S. and Mitchell, J., "A Layered Architecture for Detecting Malicious Behaviors", RAID, 2008.
|
15 |
R. Koch, "Towards Next-Generation Intrusion Detection", 3th Inter-national Conference on Cyber Conflict, pp.151-168, 2011.
|
16 |
Wei-Yu Chen, and Jazz Wang, "Building a Cloud Computing Analysis System for Intrusion Detection System", CLOUD SLAM, 2009.
|
17 |
최대수, 문길종, 김용민, 노봉남, "MapReduce를 이용한 대용량 보안로그 분석", 한국정보기술학회 논문지, 제9권, 제8호, pp.125-131, 2011.
|