1 |
H. J. Seo, D. G. Lee, J. S. Choi & H. W. Kim.(2013). IoT Security Technology Trend. Journal of KIEES, 24(4), 27-35.
|
2 |
M. Abomhara. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security, 4, 65-88.
DOI
|
3 |
H. H. Lee, Y. Y. Lee & J. S. An. (2016). Commercial and Public Software Intentional Security Weakness Trend. Journal of Information Security, 26(1), 9-19.
|
4 |
W. S. Choi, H. S. Kim & D. H. Lee. (2018). Cryptojacking Research Trends. Journal of Information Security, 28(3), 33-37.
|
5 |
Symantec. (2017). 2017 Internet Security Threat Report. 22.https://www.symantec.com/content/dam/symantec/doc s/reports/istr-22-2017-en.pdf
|
6 |
Y. X. Meng. (2011). The practice on using machine learning for network anomaly intrusion detection. In Machine Learning and Cybernetics (ICMLC), 2011 International Conference on, 2(1), 576-581.
|
7 |
H. J. Mun. (2018). Biometric Information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90.
DOI
|
8 |
H. J. Mun, Y. C. Hwang & H. Y. Kim. (2015). Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey. Journal of Convergence for Information Technology, 5(2), 1-6.
DOI
|
9 |
K. S. Kim & M. S. Kang. (2014). Next Generation Cyber Security Issues, Threats and Countermeasures. Journal of Electrical Engineering, 41(4), 69-77.
|
10 |
AhnLab. (2018). security threat trend.
|
11 |
C. T. Lim, J. H. Oh & H. C. Jung. (2010). Trend of Malicious Code Technology and Analysis Method. Information Science Society, 28(11), 117-126.
|
12 |
M. S Gu & Y. Z. Lee. (2015). A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code. Journal of Convergence for Information Technology, 5(4), 37-42.
DOI
|
13 |
H. J. Mun, S. H. Choi & Y. C. Hwang. (2016). Effective Countermeasure to APT Attacks using Big Data. Journal of Convergence for Information Technology, 6(1), 17-23.
DOI
|
14 |
R. Von Solms & J. Van Niekerk. (2013). From information security to cyber security. computers & security, 38, 97-102.
DOI
|
15 |
K. Panetta. (2017). 5 Trends in Cybersecurity for 2017 and 2018. Smarter with Gartner.
|