Context cognition technology through integrated cyber security context analysis
![]() |
Nam, Seung-Soo
(공주대학교 융합과학과)
Seo, Chang-Ho (공주대학교 융합과학과) Lee, Joo-Young (한국전자통신연구원) Kim, Jong-Hyun (한국전자통신연구원) Kim, Ik-Kyun (한국전자통신연구원) |
1 | NIS, MSIP, KCC, MOSPA, KISA, NSRI, "2013 National Information Security White Paper" Apr, 2013. |
2 | Tankard, Colin, "Advanced Persistent threats and how to monitor and deter them" Network security, pp.16-19, 2011. |
3 | http://www.microsoft.com/ko-kr/security/default.aspx |
4 | http://www.igloosec.co.kr/ |
5 | www.inzenss.com |
6 | M, O'neil, "Unix System in a Large Enterprise Environment - Axent ESM", SANS Institute Information Security Reading Room, 22 June 2001, |
7 | A. Sinha, A. Wang, and A. Chandrakasan, "Algorithmic Transforms for Efficient Energy Scalable Computation", Proc, of ISLPED, 2000, |
8 | K. Srinivasan, et al., iDedup: Latency-aware, inline data deduplication for primary storage, USENIX FAST 2012. |
![]() |