1 |
2010 대한민국 게임백서 제1부 산업계 동향 http://www.kocca.kr/center/download_new.jsp ?typecd=ics&file=/knowledge/report/kocca/__ic sFiles/afieldfile/2011/10/10/3pULQq9k2mr5.pdf
|
2 |
J. Ki, J. Cheon, and J. Kang, "Taxonomy of online game security", The Electronic Library, 22, pp. 65-73, 2004
DOI
ScienceOn
|
3 |
H. K. Kim, "Online game security", Codegate 2009 conference, http://www.hksecurity.net/home/pds/codegate2 -1(huykang.kim).pdf, 2009.
|
4 |
최성락, "온라인게임 아이템거래 발생 원인 분석", 한국게임학회, 7권, 4호, pp. 125-134, 2007
|
5 |
K. T. Chen, and L. W. Hong, "User identification based on game-play activity patterns", NetGames'07, Melbourne, Australia, 2007.
|
6 |
한창희, 김정민, 박채희, 홍유진, 김민관, "게임아이템 현금거래의 가치사슬 변화와 동향분석",한국게임학회, 11권, 2호, pp. 45-56, 2011
|
7 |
S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, "Data mining for credit card fraud: A comparative study", Decision Support Systems, 50, pp. 602-613, 2011
DOI
ScienceOn
|
8 |
S. Bono, D. Caselden, G. Landau, and C. Miller, "Reducing the attack surface in massively multiplayer online role-playing games", IEEE Security and Privacy, 7, pp. 13-19, 2009
DOI
|
9 |
Y. C. Chen, P. S. Chen, J. J. Hwang, L. Korba, R. Song, and G. Yee, "An analysis of online gaming crime characteristics", Internet Research, 15, pp. 246-261, 2005
|
10 |
D. Gunetti and C. Picardi, "Key stroke analysis of free text", ACM Transaction on Information System Security, 8, pp. 312-347, 2005
|
11 |
J. Hu and F. Zambetta, "Security issues in massive online games", Security and Communication Networks, 1, pp. 83-92, 2008
DOI
|
12 |
J. V. Hulse, T. M. Khoshgoftaar, A. Napolitano, "Experimental perspectives on learning from imbalanced data", The 24th International Conference on Machine Learning, Corvallis, Oregon, 2007.
|
13 |
Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology, 14, pp. 4-20, 2004
|
14 |
J. Yan and B. Randell, "An investigation of cheating in online games", IEEE Security and Privacy, 7, pp. 37-44, 2009
DOI
|
15 |
G. McGraw, and M. Chow, "Securing online games - Safeguarding the future of software security". IEEE Security and Privacy, 7, pp. 11-12, 2009
|
16 |
X. Peacock, Ke and M. Wilkerson, "Typing patterns: A key to user identification", IEEE Security and Privacy, 2, pp. 40-47, 2004
|