1 |
Kim, J.G., Kim, T.E., Choi, J.W., Kim, W.G., Lee, J.S. (2007). "Vulnerability analysis and research on digital contents storage system." Journal of Information and Security, Vol. 7, No. 4, pp. 36-41.
|
2 |
Hwang, H., Seo, Y., Jeon, T., Kim, C. (2018). "Design and implementation of an urban safety service system using realtime weather and atmosphere data." Journal of Korea Multimedia Society, Vol. 21, No. 5, pp. 599-608.
DOI
|
3 |
Kim, S.-H., (2019). Smart Factory Cyber Security Guide for Internalizing Security of ICT Convergence Products and Services in the Factory Field, KISA, Korea.
|
4 |
You, Y.-S. (2017). China's ICT Industry and Policy Trends in Preparation for the 4th Industrial Revolution. IITP, Vol. S17-05, Korea.
|
5 |
Quan, S.G., Kwon, Y.G., (2015). "Design and Implementation of Virtual and Invisible Private Disk(VIPDISK) having Secure Storage Device." Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 4, pp. 781-792.
DOI
|
6 |
Bae, M.-H. (2019). Analysis of Security Trends in Smart Factories in Major Countries and Implications. IITP, Weekly ICT Trends Vol. 1920, Korea.
|
7 |
Jang, Y. (2014). Accelerating U.S. Advanced Manufacturing. KIAT, Vol. 2015-55, Korea.
|
8 |
Jeong, M.G., Lee, S.H., Kim, C.S. (2020). "A study on the safety index service model by disaster sector using big data analysis." Journal of the Korea Society of Disaster Information, Vol. 16, No. 4, pp.682-690.
|