References
- Korean Internet & Security Agency, KISA Report, 2012.
- B. G. Kyoun, A study on the improvement of the computer security incident management, ungkyunkwan Univ. A Master's Degree Paper, 2011.
- D. G. Song, Hacking Infringement Accidents Analysis, Ji&Son Publishers, Korea, 2009.
- KISA, 2007년 국내 정보보호산업 시장 및 동향 조사, 2008.
- Korean Intellectual Property Office(KIPO), (http:// www.kipo.go.kr/)
- KISA, Trends report monthly malicious code detection of concealed site, 2012.
- KISA, Trends and analysis monthly of internet infringement accidents, 2012.
- IDC Korea, IDC Market Analysis: Korea Security Software 2008-2012.
- McAfee Threats Report: Third Quarter, 2012.
- T. Ma, On the Security of A Novel Elliptic Curve Dynamic Access Control System, IJSIA Vol.3 No.1, 2009.
- F. Alkhateeb, A. M. Manasrah and A. R. Bsoul, Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies, IJSIA Vol.6 No.4, 2012.
- E. Hooper, Efficient and Intelligent Network Infrastructure Protection Strategies for Complex Attacks, IDS Evasions, Insertions and Distributed Denial of Service, IJSIA Vol.1 No.1, 2007.
- Khairallah, Michael, Security System Design And Implementation Guide : The Design and Implementation of Electronic Security Systems, Butterworth-Heinemann, 2005.
- J. Y. Kang, Phishing/Pharming Examples and Countermeasure Analysis, Journal of Information Science Society, 2013.
- Market Trends and Forecast for Firewall and IP Virtual Private Network Equipment: Worldwide, 2001-2006," Market Trend, Gartner, Oct. 2002.
- C. Kaufman, et al., "Code-preserving simplifications and improvements to IKE", draft-kaufman-ipsecimproveike- 00.txt, 2001.
- H. Ould-Brahim, et al., "Network based IP VPN Architecture using Virtual Routers", draft-ietfppvpn- vr-00.txt, 2001.
- OMA, "Service and Content Protection for Mobile Broadcast Services," 2007.
- OMA, "Mobile Broadcast Services - XML Schema for OMA DRM 2.0 Extensions for BCAST(XBS),"2007.
- Curtin-Mestre K., Room S., Yngve S., "Privacy Concern with Adopting DLP Technology," RSA Conference Europe, 2009.
- G. Y. Kim, A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure, Journal of the Institute of Electronics Engineers, Vol.50 No.2, 2013.
- A. Belenky, N. Ansari, On IP Traceback IEEE Communication Magazine, vol. 41, pp. 142 - 153, July 2003.
- Stefan Savage, David Wetherall, Anna Karlin and Tom Anderson, Practical Network Support for IP Traceback, Technical Report UW-CSE-00-02-01, Department of Computer Science and Engineering, University of Washington, Seattle.