1 |
Financial Security Institute. (2017). The Forecast of the Top 10 Financial IT Security Issues in 2017. http://www.fsec.or.kr/user/bbs/fsec/42/312/bbsDataView/696.do?page=1&column=bbsDataTitle&search=2017&searchSDate=&searchEDate=&bbsDataCategory=
|
2 |
KISA. (2018). Prospects for Top 10 Internet Issues in 2018. Korea Internet & Security Agency. http://www.kisa.or.kr/public/library/etc_View.jsp?regno=0011859&searchType=&searchKeyword=&pageIndex=1
|
3 |
S. Sagiroglu & D. Sinanc. (2013, May). Big data: A review. In Collaboration Technologies and Systems (CTS). 2013 International Conference on. (pp. 42-47). IEEE.
|
4 |
I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, & S. U. Khan. (2015). The rise of "big data" on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
DOI
|
5 |
D. Puthal, S. Nepal, R. Ranjan & J. Chen. (2016). Threats to networking cloud and edge datacenters in the internet of things. IEEE Cloud Computing, 3(3), 64-71.
DOI
|
6 |
L. Xu, C. Jiang, J. Wang, J. Yuan & Y. Ren. (2014). Information security in big data: privacy and data mining. IEEE Access, 2, 1149-1176.
DOI
|
7 |
Nick Carr. (2017). Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations. FireEye. https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
|
8 |
E. David. (2017). IT threat evolution Q1. Kasperskylab. https://securelist.com/it-threat-evolution-q1-2017/78452/
|
9 |
D. Gray. (2018). IBreaking Down the Rapidly Evolving GandCrab Ransomware. McAfeelab. https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/gandcrab-ransomware/
|
10 |
E. David. (2017). IT threat evolution Q2. Kasperskylab. https://securelist.com/it-threat-evolution-q2-2017/79354/
|
11 |
A. Rehman & T. Saba. (2014). Evaluation of artificial intelligent techniques to secure information in enterprises. Artificial Intelligence Review, 42(4), 1029-1044.
DOI
|
12 |
D. Gary. (2018). Breaking Down the Rapidly Evolving GandCrab Ransomware. McAfeelab. https://securingtomorrow.mcafee.com/consumer/consumer-threat-notices/gandcrab-ransomware/
|
13 |
R. Richardson & M. North. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-21.
|
14 |
R. Roman, J. Lopez, & M. Mambo. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.
DOI
|
15 |
J. L. Tsai & N. W. Lo. (2015). A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE systems journal, 9(3), 805-815.
DOI
|
16 |
KISA. (2017). Prospects for Top 10 Information Protection Issues in 2017. Korea Internet & Security Agency. http://www.kisa.or.kr/public/library/etc_View.jsp?regno=022280&searchType=&searchKeyword=&pageIndex=1
|
17 |
Financial Security Institute. (2018). The Forecast of the Top 10 Financial IT Security Issues in 2018. Financial Security Institute. http://www.fsec.or.kr/user/bbs/fsec/42/312/bbsDataView/968.do?page=1&column=bbsDataTitle&search=2018&searchSDate=&searchEDate=&bbsDataCategory=
|