참고문헌
- J. S. Kim, DB security for the protection of personal information(2006), Retrieved Dec., 10, 2013, from http://blog.naver.com/mybrainz/150007657976
- Wikipedia vulnerability(2012), Retrieved Dec. 12, 2013, from http://ko.wikipedia.org/
- DB Vulnerability Analysis Summary, Retrieved Dec. 20, 2013, from www.DBGuide.net
- Listener(2009), Retrieved Dec., 2, 2013, from http://www.netbuysell.co.kr/global_asp/board/board_view.asp?Codeno=5&K_no=359&Pgtype=A
- S. H. Lee, Y. J. Maeng, D. H. Nyang, and K. H. Lee, "Possibility of disclosure of user information in internet explorer," J. KICS, vol. 38B, no. 12, pp. 937-943, 2013. https://doi.org/10.7840/kics.2013.38B.12.937
- J. H. Lee, J. S. Park, S. W. Jung, and S. Jung, "The authentication and key management method based on PUF for secure USB," J. KICS, vol. 38B, no. 12, pp. 944-953, 2013. https://doi.org/10.7840/kics.2013.38B.12.944
- W. S. Seo and M. S. Jun "The management and security plans of a separated virtualization infringement type learning database using VM (virtual machine)," J. KICS, vol. 36, no. 8, pp. 947-953, 2011. https://doi.org/10.7840/KICS.2011.36B.8.947
- P.-H. Jo, J.-I. Lim, and H.-K. Kim "A study on improvement of security vulnerabilities in intelligent transport system," J. The Korea Inst. Inf. Security & Cryptology(JKIISC), vol. 23, no. 3, pp. 531-543, 2013. https://doi.org/10.13089/JKIISC.2013.23.3.531
- D.-J. Kim and S.-J. Cho "An analysis of domestic and foreign security vulnerability management systems based on a national vulnerability database," Internet lnf. Security, vol. 1, no. 2, pp. 130- 147, 2010.
- I.-Y. Mun and S.-M. Oh "Vulnerability analyzers for the mobile application the design and implementation," J. Korea Multimedia Soc., vol. 14, no. 10, pp. 1335-1347, Oct. 2011. https://doi.org/10.9717/kmms.2011.14.10.1335
- S.-M. Yang and J. S. Park "An efficient access control mechanism for secure surveillance systems," J. KICS, vol. 39B, no. 4, pp. 228-233, 2014. https://doi.org/10.7840/kics.2014.39B.4.228
- J.-S. Park, M.-H. Park, and S.-H. Jung "A whitelist-based scheme for detecting and preventing unauthorized AP access using mobile device," J. KICS, vol. 38B, no. 8, pp. 632-640, 2013. https://doi.org/10.7840/kics.2013.38B.8.632
- H.-U. Yoo, J.-H. Yun, and T.-S. Shon "Whitelist-based anomaly detection for industrial control system security," J. KICS, vol. 38B, no. 8, pp. 641-653, 2013. https://doi.org/10.7840/kics.2013.38B.8.641
- Y.-H. Lee, J. H. Kang, and S. J. Lee "A specification-based intrusion detection mechanism for LEACH protocol," J. KICS, vol. 37B, no. 2, pp. 138-147, 2012. https://doi.org/10.7840/KICS.2012.37B.2.138