1 |
Zedner, L.: The concept of security: an agenda for comparative analysis. Leg. Stud. 23(1), 153-175 (2003)
DOI
|
2 |
ROK Defense Agency for Technology and Quality: Dictionary of National Defense Science and Technology Terms (2017)
|
3 |
ROK Ministry of National Defense: Defense Technol ogy Security Act (2017)
|
4 |
ROK Ministry of National Defense: Directive, Defen se Industrial Security Service (2017)
|
5 |
Wolfers, A.: "National Security" as an ambiguous symbol. Polit. Sci. Q. 67(4), 481-502 (1952)
DOI
|
6 |
U.S. Department of Defense: (DoD) 5220.22-M, National Industrial Security Program Operating Manual (2006)
|
7 |
Defense Industrial Base Information Sharing and An alysis Center. http://www.dibisac.net
|
8 |
Baldwin, D.A.: The concept of security. Rev. Int. Stud. 23, 5-26 (1997)
DOI
|
9 |
Jang, W.: The present status and development strategies of defense industry in South Korea.Sci. Technol. Policy 27(11), 38-45 (2017)
|
10 |
ROK Ministry of National Defense: Military Secret Protection Act (2015)
|
11 |
Kim, Y.: A study on the criminal laws of security in the defense industry of South Korea. Korean J. Ind. Secur. 2(2), 49-90 (2011)
|
12 |
Shin, H.: A study on the analysis and countermeasure of the real condition for defense industry secrecy-spillage. Master's thesis, Dongguk University, South Korea (2008)
|
13 |
Woo, K.: Research trend and conceptualization of defense industry security from convergence security perspective. J. Inf. Secur. 15(6), 69-78 (2015)
|
14 |
Cho, W.: Industrial policies enhancing the level of security of the defense industry. Master's thesis, The University of Suwon, South Korea (2015)
|
15 |
Lee, J.: Legal restrictions on the industrial secret outfl ow: concentrated on the defense industry. Master's thesis, Seoul School of Integrated Sciences and Technologies (2013)
|
16 |
Dussauge, P., Cornu, C.: L' industrie Francaise de l'armement. Economica (1998). (in French)
|
17 |
ROK Defense Acquisition Program Administration: Defense Acquisition Program Statistical Yearbook (2016)
|
18 |
ROK Ministry of National Defense: Defense Acquisition Program Act (2017)
|
19 |
Y. J. Lee, C. B. Lee, "An Fingerprint Authentication Model of ERM System using Private Key Escros Management Server", Journal of The Korea Academia Industrial cooperation Society, 20.6 (2019): 1-8. DOI:https://doi.org/10.5762/KAIS.2019.20.6.1
DOI
|
20 |
Y. J. Lee, T. Y. Jeon, "A Malware Detection Method using Analysis of Malicious Script Patterns", Journal of The Korea Academia Industrial cooperation Society, 20.7 (2019): 613-621. DOI:https://doi.org/10.5762/KAIS.2019.20.7.613
DOI
|