1 |
KISA, "CCTV Personal Video Information Protection Guideline," http://www.kisa.or.kr, 2007.
|
2 |
T.W. Seo, S.R. Lee, B.C. Bae, "An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control," Journal of Korea Multimedia Society, vol. 15, no. 1, pp 93-100, Jan. 2012. DOI: http://dx.doi.org/10.9717/kmms.2012.15.1.093
DOI
|
3 |
TTA, "Security Requirements of the Video Surveillance System," http://www.tta.or.kr, 2012.
|
4 |
Y.S. Won, S. H. Yun, "CCMP Packet design for security CCTV environment," The conference of Korea Communication Society, Dec. 2013.
|
5 |
K.J. Bae, K.R. Lee, K.B. Yim, "Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System," Journal of Korea Internet Information Society, vol. 12, no. 2, pp 123-133, Apr. 2011.
|
6 |
Y.D. Hwang, D.K. Park, "Design and Implementation of Android-based NVR System," The Journal of Korea Institute of Information Technology, Apr. 2016. DOI: http://dx.doi.org/10.14801/jkiit.2016.14.4.109
|
7 |
D.S. Kim, E. J. Yoon, "Study of Imaging Security Using Lightweight Cryptography and Data Hiding Technique on IoT," The conference of the institute of electronics and information engineers, pp 1791-1793, Jun. 2015.
|
8 |
H.J. Kong, H.S.Chu, "Inter-PMIPv6-Domain Hand over Scheme Based on Tunneling," The conference of Korea Information Society, May 2009.
|
9 |
Y.S. Ko, K.H. Park, C.S. Kim, "Problem Analysis and Countermeasures Research through Security Threat Cases of Physical Security Control System," The Journal of Korea Multimedia society, vol. 19, no. 1, January, 2016. DOI: http://dx.doi.org/10.9717/kmms.2016.19.1.051
|
10 |
Kuwar Kuldeep V V Singh, Himanshu Gupta, "A New Approach for The Security of VPN," Proceedings of the Second International conference on Information and Communication Technology for Competitive Strategies, Mar. 2016.
|