1 |
김인중, "중요핵심기반시설(SCADA)에 대한 보안관리연구", 한국통신학회논문지, 30권, 8C호, pp.838-848, 06, 2005.
|
2 |
방송통신위원회, 2010 국가정보보호백서, 행정안전부, 4월, 2010년.
|
3 |
강대권, "Virtual Honeynet을 이용한 신종공격 탐지기술 개발", 한국전자통신학회논문지, 5권, 4호, pp.406-411, 2010.
|
4 |
Honeynet Project, Know Your Enemy :Honeynets, http://www.honeynet.org,2006
|
5 |
The Honeynet Project. http://www.honeynet.org.
|
6 |
Wikipdeia, Comparison of platform virtual machines, http://en.wikipedia.org/wiki/Comp arison_of_platform virtual_machines
|
7 |
E.Alata,Lessons learned from the deployment of a high-interaction honeypot, IEEE Computer Society,2006
|
8 |
Sebek. https://projects.honeynet.org/sebek/
|
9 |
HFlow, https://projects.honeynet.org/hflow/
|
10 |
G. Bednarski et el, "Understanding Network Threats through Honeypot Deployment", CMU, pp 273-306, 2004.
|
11 |
Ricky M,Understanding Virtual Honeynets, magam, 2004.
|
12 |
김영진, "SCADA시스템의 안전성 확보방안에 관한 연구", 한국정보보호학회논문지, 19권, 6호, pp.146-149, 2009.
|