1 |
Samsung Electronics Security Group, "Loss Prevention Technology Direction for the Information Systems Security," 2007.
|
2 |
S. S. J, "The Improved-Scheme of Two Factor Authentication using SMS," Vol 17, No 6, pp.25-30, 2012.
과학기술학회마을
DOI
|
3 |
H. W. Kim, "A Priority Analysis on E-Commerce Security Factors-Focused on Researchers and Practitioners," Journal of the Korea Industrial Information System Society, Vol 16, No 2, pp.163-171, 2011.
과학기술학회마을
DOI
|
4 |
Korea Internet & Security Agency, "2014 National Information Security," White Papers, 2014.
|
5 |
Y. M. Lee, "Internet Security and Security Management System (ESM) Building Plan," Beaje University, Master Thesis, 2004.
|
6 |
J. W. Cha, C. H. Kim, "Design of FPGA Hardware Accelerator for Information Security System," Journal of the Korea Industrial Information System Society, Vol 18, No 5, pp.1-12, 2013.
과학기술학회마을
DOI
|
7 |
Korea Internet & Security Agency, "Information Security Survey 2012," 2012.
|
8 |
Mirage Networks, "Getting the Knack of NAC, 2006.
|
9 |
National Information Society Agency, "2007 Trends in the Domestic Market and the Industry Survey," 2007.
|
10 |
Korea Internet & Security Agency, "2013 National Information Security," White Papers, 2013.
|
11 |
J. S. Kim, "A Study on the Method of Applying NAC to End-point Security in University Computer Network," Seoul National University, Master Thesis, 2008.
|
12 |
H. S. Jun, "Effective Network Security Model for Dynamic Network Access Control," Korea University, Master Thesis, 2008.
|