1 |
D. H. Lakshminarayana, J. Philips & N. Tabrizi. (2019). A survey of intrusion detection techniques. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) (pp. 1122-1129). IEEE. DOI : 10.1109/ICMLA.2019.00187.
DOI
|
2 |
J. Y. Moon. & Y. H. Jang. (2016). Ransomware Analysis and Method for Minimize the Damage. The Journal of the Convergence on Culture Technology (JCCT), 2(1), 79-85. DOI : 10.17703/JCCT.2016.2.1.79
DOI
|
3 |
H. J. Mun, S. H. Choi & Y. C. Hwang. (2016). Effective Countermeasure to APT Attacks using Big Data. Journal of Convergence for Information Technology, 6(1), 7-23. DOI : 10.221 56/CS4SMB.2016.6.1.017
DOI
|
4 |
Y. C. Hwang. & H. J. Mun (2019). Intrusion Situation Classification Model for Intelligent Intrusion Awareness. Journal of Convergence for Information Technology, 9(3), 134-139. DOI : 10.22156/CS4SMB.2019.9.3.134
DOI
|
5 |
KISA. (2021). Ransomware Special Report. KISA(Online). https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=36211
|
6 |
Y. Wang, W. Ji & J. Wang. (2012). Design and Implementation of Inference Engine for Conflict Resolution. In 2012 Second International Conference on Intelligent System Design and Engineering Application (pp. 220-223). IEEE. DOI : 10.1109/ISdea .2012.677.
DOI
|
7 |
S. Park. (2014). Current Status and Analysis of Domestic Security Monitoring Systems. Journal of the Korea Institute of Electronic Communication Sciences, 9(2), 261-266. DOI : 10.13067/JKIECS.2014.9.2.261
DOI
|
8 |
AhnLab. (2017). Latest Ransomware Trend Analysis Report. Seongnam : AhnLab.
|
9 |
CERT-EU. (2017). WannaCry Ransomware Analysis Propagated to Windows SMB Vulnerabilities. RedAlert.
|
10 |
Kenet. (2017). Petya Ransomware v0.3 National KE-CIRT-CC Report. ThaiCERT(Online). https://cert.kenet.or.ke/node/2.
|
11 |
KISA. (2017). Cyber Threat Trend Report for the first quarter of 2017. KISA(online). https://www.krcert.or.kr/data/reportView.do?bulletin_writing_sequence=25623&queryString=cGFnZT03JnNvcnRfY29kZT0mc29ydF9jb2RlX25hbWU9JnNlYXJjaF9zb3J0PXRpdGxlX25hbWUmc2VhcmNoX3dvcmQ9.
|
12 |
HAURI. (2017). SECURITY MAGAZINE ViRobot. HAURI(Online). http://www.hauri.co.kr/EBook/zoom.html?intSeq=99.
|
13 |
E. J. Khaleefa & D. A. Abdulah. (2022). Concept and difficulties of advanced persistent threats (APT): Survey. International Journal of Nonlinear Analysis and Applications, 13(1), 4037-4052. DOI : 10.22075/IJNAA.2022.6230
DOI
|
14 |
Charith Perera, et al. (2014). Context Aware Computing for the Internet of Things: A Survey. Communications Surveys & Tutorials, IEEE. 16(1). 414-454. DOI : 10.1109 /SURV.2013.042313.00197.
DOI
|
15 |
TACHYON & ISARC. (2017). Analysis of sage ransomware that appeared in version 2.0. (Online). https://isarc.tachyonlab.com/1085.
|
16 |
Korea Ransomware Infringement Response Center. (2017). CryptoShield. rancert(Online). https://www.rancert.com/bbs/bbs.php?bbs_id=case&mode=view&id=64.
|
17 |
M. C. Lim. (2017). Ransomware Infected Linux Servers, What Happens?. ZDNet Korea(Online). https://zdnet.co.kr/view/?no=20170613100723.
|