1 |
J.H. Lee and S.J. Lee, "Improvement of Dynamic Web Vulnerability Inspection Method and Procedure by Website Structuring and Calculating Each Page's Action Size," Journal of Knowledge Information Technology and Systems (JKITS), Vol.12, No.5, pp.747-763, 2017 doi:10.34163/jkits.2017.12.5.015
DOI
|
2 |
Daeil Yang, Information Security Overview, Hanbit Academy Publisher, pp. 235-238, 2013
|
3 |
H.H. Jin, and H.K. Kim, "A Study on Web Vulnerability Risk Assessment Model Based on Attack Results : Focused on Cyber Kill Chain," Journal of The Korea Institute of Information Security & Cryptology, Vol.31, No.4, pp.779-791, 2021 doi:/10.13089/JKIISC.2021.31.4.779
DOI
|
4 |
J.B. Kim, "A Study on the Successful Implementation about Vulnerability Supplementation and Effective Recovery from Damage related with Web Application," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology (AJMAHS), Vol.6, No.2, pp.53-60, 2016 doi:10.35873/ajmahs.2016.6.2.007
DOI
|
5 |
KISA, Web vulnerability analysis and technical support, Korea Internet Security Agency, 2016
|
6 |
M. S. Kim, "Bombu hacking is attacking web vulnerability DB-the reason for the 2 million personal information was revealed," http://news.kukinews.com/news/article.html?no=317262, May 2017.
|
7 |
J.H Lee, "Risk Level Assessment Method on Major Information and Communication Infrastructure's Web Vulnerability Check Item using by AHP Technique," Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology (AJMAHS), Vol.9, No.6, pp.719-728, 2019 doi: 10.35873/ajmahs.2019.9.6.070
DOI
|
8 |
H.W. Kim, "A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases," International Journal of Internet, Broadcasting and Communication (IJIBC), Vol.12 No.4 180-187, 2020 http://dx.doi.org/10.7236/IJIBC.2020.12.4.180
DOI
|
9 |
Korea Internet & Security Agency, Detailed guide on how to analyze and evaluate technical vulnerabilities of major information and communication infrastructure, Feb, 2017
|
10 |
D. S. Jeong, Many security vulnerabilities found in most web applications, Apr, 2017 http://digitalyeogie.com/entry/49451?locPos=25 Q&ts=1487390696&page=4862, Apr. 2017
|