References
- 개인정보보호위원회, [시행 2023. 9. 22.] 개인정보의 안전성 확보조치 기준
- 한국인터넷진흥원, ISMS-P 인증기준 안내서(2023.11) 수정게시
- 채현탁, "Security policy proposals through PC security solution log analysis : prevention leakage of personal information" , pp. 961-968 한국정보보호학회논문지, Feb. 2015.
- 엄정호, "The Quantitative Evaluation of a Level of Insider Activity using SFI Analysis Techniques," 10(2), pp. 113-122 보안공학연구논문지, Apr.2013
- 이광우, 김승주."Analysis of Trends in Digital Multifunction Device Security Technology from the Viewpoint of Preventing and Protecting Business Confidential Information.", 20(1). pp. 정보보호학회논문지, Feb. 2010
- 정귀영, "A Study on the Effective User Anomaly Detection Method through Integrated Security Log Analysis," master's thesis, Yonsei University, Feb. 2017.
- 박장수, 이임영, "Information Security : Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario," pp. 65-72 KIPS 정보처리학회논문지, Feb. 2015
- 김은선, "A Study on the Anomaly Detection using User Log : ERP System An Empirical Study," master's thesis, Korea University, Feb. 2015.
- 박성주, 임종인 "A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information", pp. 637-644 정보보호학회논문지, June. 2012