1 |
D. Kim, Y. Jeong, G. Yun, H. Yoo, S. Cho, G. Kim, J. Lee, H. Kim, T. Lee, J. Lim, and D. Won, "Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems," Korea Institute of Information Security and Cryptology, vol. 22 no. 5, 2012, pp. 1191-1204.
|
2 |
J. Ko, H. Kwak, J. Wang, H. Kwon, and K. Chung, "An Improved Signature Hashing Algorithm for High Performance Network Intrusion Prevention System," Korea Institute of Information Security and Cryptology, vol. 16C no. 4, 2009, pp. 449-460.
|
3 |
J. Hoon, "A Study on The Vulnerabilities and Problems of Security Program," J. of Convergence Security, vol. 12 no. 6, 2012, pp. 77-84.
|
4 |
Y. Lee, "A Design and Analysis of Multiple Intrusion Detection Model," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 619-626.
DOI
|
5 |
K. Kim, D. Wang, and S. Han, "Home Security System Based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 8, 2016, pp. 743-750.
DOI
|
6 |
J. Shin, "Economic Analysis on Effects of Cyber Information Security in Korea: Focused on Estimation of National Loss," J. of the Korean Institute of Information Security and Cryptology, vol. 23 no. 1, 2013, pp. 89-96.
DOI
|
7 |
S. Paik, S. Kim, and H. Park, "Design and Implementation of Network Access Control for Security of Company Network," Journal of the Institute of Electronics Engineers of Korea, vol. 47, no. 12, 2010, pp. 90-96.
|
8 |
K. Kim, Y. Park, S. Ro, and B. Kim, "Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method," J. of the Korea Institute of Information and Communication Engineering, vol. 16 no. 9, 2012, pp. 1955-1962.
DOI
|
9 |
M. C. Park, Y. S. Park, Y. R. Choi, "A Study on the Active Traceback Scheme Responding to a Security Incident," J. of the Korea Society of Computer and Information, vol. 10, no. 1, 2005, pp. 27-34.
|