1 |
Satty, T. L. (1990). How to Make a Decision: The Analytic Hierarchy Process, European Iournal of Operation Research, 48(1), 9-26.
DOI
|
2 |
Gartnet(2017), Innovation Insight for Security Orchestration, Automation and Response, White paper, 30 November.
|
3 |
Harker, D. T. and Vargas, L. G.(1987) The theory of ratio scale estimation: Satty's analytic hierarchy process, Management Science. 33(11), 1383-1403.
DOI
|
4 |
So, H. C. and Kim, J. K.(2017). Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness, Journal of the Korea Industrial Information Systems Research, 22(4), 45-64.
DOI
|
5 |
Hong, J. H. and Lee, B. Y. (2021). Artificial Intelligence-based Security Control Construction and Countermeasures, The Korea Contents Society, 21(1), 531-540.
|
6 |
Lee, J. K. and Jo, I. J. (2021), Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines, The Korea Contents Society, 21(1), 284-291.
|
7 |
Jo, C. S. and Shin, Y. T. (2019). A Study on Improvement of Cyber Security Framework for Security Operations Center, Convergence security journal, 19(1), 111-120.
|
8 |
Pi, D. K, Park, W. H. (2019). A study on Security Control & Monitoring Model of Industrial Security Threat in the Darkweb Environment, The Korea Association for Industrial Security, 9(1), 117-140.
|
9 |
Chae, H. G., Lee, G. H. and Lee, J. Y.(2021). Analysis of Domestic and Foreign Financial Security Research Activities and Trends through Topic Modeling Analysis, Journal of the Korea Industrial Information Systems Research, 26(1), 83-95.
DOI
|
10 |
Chanm, F. T. S. and Kumar, N. (2007). Global Supplier Development Considering Risk Factors using Fuzzy Extended AHP-based Approach, Omega, 35(4), 417-431.
DOI
|
11 |
Choi, Y. B., Kim, J. H., Kim, J. W. and Moon, B. H.(2017). Implementation of OTP Detection System using Imaging Processing, Journal of the Korea Industrial Information Systems Research, 22(6), 17-22.
DOI
|
12 |
KISA (2020), KrCERT/CC publishes the trends of cyber threat for 2021 with AusCERT, CERT-In, and Sri Lanka CERT| CC, 07 Dec.
|
13 |
Oh, Y. T. and Jo, I. J. (2019) Development of Integrated Security Control Service Model based on Artificial Intelligence Technology, Korea Contents Society, 19(1), 108-116.
|
14 |
Park, J. B., Choi, B. H. and Jo, H. S. (2018), A Study on the Activation of Cyber Threat Information Sharing, Journal of The Korean Institute of Communication Sciences, 35(7), 41-48.
|
15 |
Jeong, K. M. and Park, H. S. (2011). Design of a Security Monitoring System based on correlation analysis. KSCI review Conference, 335-338.
|
16 |
Kim, B. I. (2019). Automatic collection and analysis of cyber threat information, ICT R&D Trend, 31-37.
|
17 |
Kim, Y. J., Lee, S. H., Kwon, H. Y. and Lim, J. I. (2009). A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services, Journal of the Korea Institute of Information Security and Cryptology, 19(1), 103-111.
DOI
|
18 |
Lin, C. and Hsieh, P. J. (2004). A Fuzzy Decision Support System for Strategic Portfolio Management. Decision Support Systems, 38, 383-398.
DOI
|
19 |
Yonhapnews. (2021). Strengthening the prevention of cyber threats such as hacking, https://www.yna.co.kr(Accessed on Feb, 18th, 2021).
|