1 |
D.-Y. Kim, "Vulnerability Analysis for Industrial Control System Cyber Security," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 1, 2014, pp. 137-142.
과학기술학회마을
DOI
|
2 |
D.-K. Kang, M.-Y. Hyun, and C.-S. Kim, "Cyber trap : Unknown Attack Detection System based on Virtual Honeynet," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 6, 2013, pp. 863-871.
DOI
|
3 |
I.-Y. Lee, J.-I. Cho, K.-H. Cho, and J.-S. Moon, "A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values," J. of the Korea Institute of information Security & Cryptology, vol. 18, no. 5, 2008, pp. 135-147.
과학기술학회마을
|
4 |
S.-J. Park and J.-H. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Commu nication Sciences, vol. 9, no. 2, 2014, pp. 261-266.
과학기술학회마을
DOI
|
5 |
C. Kaufman, M. Spiciner, and R. Perlman, Network Security Private Communication in a PUBLIC World, 2nd Edition, Englewood Cliffs, NJ : Prentice Hall, 2002.
|
6 |
M. O'Neill, P. Hallam-Baker, and S. M. Cann, Web Services Security. New York : McGraw-Hill, 2003.
|
7 |
S. Garfinke, Web Security, Privacy and Commerce, 2nd Edition, Sebastopol, CA : O'Reilly Media, 2002.
|