1 |
Chrismon D, Ruks M. Threat Intelligence: Collecting, analyzing, evaluating, MWR Infosecurity, UK Cert, United Kingdom; 2015. https://www.foo.be/docs/informations-sharing/Threat-Intelligence-Whitepaper.pdf
|
2 |
Sitaram Kowtha, Laura A. Nolan, Rosemary A. Daley, 'Cyber Security Operation Center Characterization Model and Analysis', Johns Hopkins University, Applied Physics Laboratory, 978-1-4673-2709-1/12, IEEE, 2012. https://doi.org/10.1109/THS.2012.6459894
|
3 |
Tae-Woong Seo, 'An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control', Journal of Multimedia, 15(1), Jan, 2012.
|
4 |
Han Choong-Hee, "A Study on Cyber Threat Detection Response Analysis and Blocking Method", Doctor's Thesis, Department of Interdisciplinary Program of Information Security Graduate School of Chonnam National University, pp. 1~121. Aug, 2019.
|
5 |
McMillan R. Definition: threat intelligence. Gartner; 2013. https://www.gartner.com/imagesrv/media-products/pdf/webroot/issue1_webroot.pdf
|
6 |
Gil Sun, Yu, 'A Study on the Cyber Security monitoring Detection and Response', Department of Digital Forensics, The Graduate School of Hanseo University, August, 2018.
|
7 |
Han Choong-Hee, "Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system", International Journal of Critical Infrastructure Protection, Volume 26, 100312, Sept. 2019. https://doi.org/10.1016/j.ijcip.2019.100312
DOI
|
8 |
Dalziel H. How to define and build an effective cyber threat intelligence capability. Syngress Publishing of Elsevier; 2014. https://www.sciencedirect.com/book/9780128027301/how-to-define-and-build-an-effective-cyber-threat-intelligencecapability
|
9 |
Cyril Onwobiko, 'Cyber Security Operation Centre: Security Monitoring for protecting Business and supporting Cyber Defense Strategy', Intelligence & Security Assurance, E-Security Group, London, UK. 2018. https://doi.org/10.1109/CyberSA.2015.7166125
DOI
|
10 |
Eui-yeon Jung, 'A Study on the Integrated Security Monitoring &Control in Financial Investment Industry Computer Networks', Korea Information Processing Society, 19-2, Feb, 2012. https://www.koreascience.or.kr/article/CFKO201221868477405.jsp-kj=SSMHB4&py=2012&vnc=v27n6&sp=588
|
11 |
Kim, MinJun, 'A study on the implementation of white-list intrusion detection system on control networks', Department of Industry Security, Graduate School, Kyonggi Univ, Jun, 2011.
|
12 |
Han Choong-Hee, 'Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry', Journal of the Korea Institute of Information Security and Cryptology 29(2), pp. 401~415, Apr, 2019. https://doi.org/10.13089/JKIISC.2019.29.2.401
DOI
|