1 |
Lee, J.S., Lee, K.H. (2014). "A study on security container to prevent data leaks." Journal of The Korea Institute of Information Security & Cryptology, Vol. 24, No. 6, pp. 1225-1241.
DOI
|
2 |
Hong, D.Y., Ko, W.S., Im, S.S. (2014). "Virtualization techniques for secure and reliable computing." Journal of The Korea Institute of Information Scientists and Engineers, Vol. 26, No. 10, pp. 50-57.
|
3 |
Ju, J.H., Ma, S.Y., Moon, J.S., (2014). "Proposal of security requirements for storage virtualization system against clouding computing security threats." Journal of Security Engineering, Vol. 11, No. 6, pp. 469-478.
DOI
|
4 |
Kim, J.G., Kim, T.E., Choi, J.W., Kim, W.G., Lee, J.S. (2007). "Vulnerability analysis and research on digital contents storage system." Journal of Information and Security, Vol. 7, No. 4, pp. 36-41.
|
5 |
Kim, C., Choi. D., Yi. J., Kim. J. (2014). "A study of program execution control based on Whitelist." Proceedings of the Korea Institute of Information and Communication Science Conference, KIICE, Korea, pp. 346-349.
|
6 |
Kim, S.Y., Kim, G.Y., Hwang, I.C., Kim, D.S. (2017). "e-forensic tool research for obtaining legal evidence ability of digital evidence by intelligence inspection." 2017, Vol. 13, No. 2, pp. 267-275.
|
7 |
Kim, S.Y., Hwang, I.C., Kim, D.S. (2021). "A study on next-generation data protection based on non file system for spreading smart factory." Journal of the Society of Disaster Information, Vol. 17, No. 1, pp. 176-183.
DOI
|