1 |
Defense Agency for Technology and Quality,"Future defense technology linked with the fourth industrial revolution", 2017
|
2 |
S. J. Yun,"[Military china - Yoon Seok-joon's 'Chaimil'] Already started US-China version "US naval ship accident, is not it a coincidence?", 2017, [cited 2017 November 24], Avaliable From: https://blog.naver.com/china_lab/221147405605
|
3 |
C. Y. Park, Naver News Crawlong, N2H4 R package, Avaliable From: https://github.com/mrchy park/N2H4
|
4 |
A. Alexandra, C. Paulo, R. Paulo, M. Sergio, "Research trends on Big Data in Marketing: A text mining and topicmodeling based literature analysis", Vol. 24, Issue 1, pp. 1-7, 2018
|
5 |
"K-ICT Strategy 2016", July 1, 2016, Avaliable From: https://blog.naver.com/0mikyoung0/220750945661
|
6 |
Cisco Korea Blog,"How many spam do you receive?",February 28, 2017, Avaliable From: http://www.ciscokrblog.com/1169
|
7 |
S. J. Kim ,S. W. Lee, 2018, "Social Engineering based Security Requirements Recommendation Framework to Prevent an Advanced Persistent Threat," Journal of KIISE, Vol. 45, No. 10, pp. 1015-1028. DOI: http://dx.doi.org/18-510
DOI
|
8 |
B. H. Kim, D. W. Cho, "Network security technology trends and prospects", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 4, pp. 99-106, 2014
|
9 |
Digital Story,"SK Communications Nate Hack, 2011", 2011, Avaliable From: https://blog.naver.com /hahaseyo/10115157336
|
10 |
National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity, 2017
|
11 |
"Top 10 vulnerabilities in 2016", January 24, 2017, Avaliable From: http://blog.alyac.co.kr/942
|
12 |
J. H. Eom, M. J. Kim, 2016, "Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 463-474. DOI: http://dx.doi.org/10.13089/JKIISC.2016.26.2.463
DOI
|
13 |
Y. H. Noh, T. Y. Kim, D. K. Jeong, K. H. Lee, "Trend Analysis of Convergence Research based on Social Big Data" JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 19, No. 2, pp. 135-146, Feb, 2019. DOI: https://10.5392/JKCA.2019.19.02.135
DOI
|
14 |
S. W. Jang,"President Trump's signature 'Block Chain Cyber Security Research' bill", 2017,[cited 2017 December 14], Avaliable From: http://bigdata. getnews.co.kr/view.php?ud=201712141002174184d48e16fff2_23
|
15 |
Blue house,"Enhanced capacity to respond to asymmetric threats such as North Korea's Nuclear Issue No.85 (Ministry of National Defense)", 2017, Avaliable From: http://www1.president.go.kr/governmentprojects
|
16 |
Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2017.
|
17 |
M. Song, "Technology Trend Analysis Using Text Mining: Newspaper Article Data," Proceedings of the Korea Information Management Society, pp. 9-30, Nov, 2017.
|
18 |
J. H. Kim, S. H. Kim, I. K. Cho, H. S. Cho, B. K. Noh, "Cyber Security Technology Trends Using Big Data", ETRI, pp. 19-29, 28, 2013.
|
19 |
M. J. Kim, C. J. Kim, "Trend Analysis of News Articles Regarding Sungnyemun Gate using Text Mining," JOURNAL OF THE KOREA CONTENTS ASSOCIATION, Vol. 17, No. 3, pp. 474-485, Mar, 2017. DOI: https://doi.org/10.5392/JKCA.2017.17.03.474
DOI
|
20 |
J.A. Park, Im, H. B. Im, "Understanding Customer's Mind using Big Data Analytics," Korean Psychological Association Conference, pp. 200-200, Aug, 2018.
|
21 |
INTERNET TREND, May 3, 2012 - December 31, 2018, Avaliable From: http://trend.logger.co.kr/trendForward.tsp
|
22 |
Naver,"Security/Hacking News", May 3, 2012 - December 31, 2018, Avaliable From: http://news.naver.com/main/list.nhn?mode=LS2D &mid=shm&sid1=105&sid2=732
|
23 |
Korea Information Security Industry Association, "National Survey on Information Protection Industry", 2018.
|