1 |
Gartner, "Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020", http://www.gartner.com/newsroom/id/2636073. Accessed 31 July 2019, 2011.
|
2 |
Shaji, R. S., Dev, V. S., & Brindha, T. "A methodological review on attack and defense strategies in cyber warfare", Wireless Networks, Vol.25, No.6, pp.3323-3334, 2019.
DOI
|
3 |
Park, W., Na, O., & Chang, H, "An exploratory research on advanced smart media security design for sustainable intelligence information system", Multimedia Tools and Applications, Vol.75, No.11, pp.6059-6070, 2016.
DOI
|
4 |
Atzori, L., Iera, A., & Morabito, G, "The internet of things: A survey", Computer networks, Vol.54, No.15, pp.2787-2805, 2010.
DOI
|
5 |
Kim, H., Kwon, H., & Kim, K. K, "Modified cyber kill chain model for multimedia service environments", Multimedia Tools and Applications, Vol.78, No.3, pp.3153-3170, 2019.
DOI
|
6 |
전정훈, "사물 인터넷의 보안 위협 요인들에 대한 분석", 융합보안논문지, 제15권, 제7호, pp.47-53, 2015.
|
7 |
최관, 김민지, "기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로", 융합보안논문지, 제17권, 제5호, pp.101-110, 2017.
|
8 |
한슬기, 김명주. "사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용", 융합보안논문지, 제18권, 제2호, pp.49-58, 2018.
|
9 |
Cox, G, "Managing the risks of shadow IoT", Network Security, pp.14-17, 2019.
|
10 |
Zhou, L., & Chao, H. C, "Multimedia traffic security architecture for the internet of things", IEEE Network, Vol.25, No.3, pp.35-40, 2011.
DOI
|
11 |
Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A, "A review of bring your own device on security issues", Sage Open, pp.1-11, 2015.
|
12 |
Disterer, G., & Kleiner, C, "BYOD bring your own device", Procedia Technology, Vol.9, pp.43-53, 2013.
DOI
|
13 |
Trend Micro, "Trend Micro Research Finds Major Lack of IoT Security Awareness", https://newsroom.trendmicro.com/press-release/commercial/trend-micro-research-finds-major-lack-iot-security-awareness. Accessed 31 July 2019, 2018.
|