References
- G. H. Lee and C. G. Lee, "A Study on Building Leakage Prevention System using Analysis of Information Leakage Signs," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 19, No. 3, pp. 70-79, Jun. 2009.
- J. H. Kim and H. J. Kim, "Prevention of information leakage and privacy violation," Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC, Vol. 21, No. 5, pp. 45-49, Aug. 2011.
- A. B. Garba, J. Armarego, D. Murray and W. Kenworthy, "Review of the information security and privacy challenges in BYOD environments," Journal of Information privacy and security, pp. 38-54, 2015.
- D. S. Choi, G. J. Mun, Y. M. Kim and B. N. Noh, "An Analysis of Large-Scale Security Log using MapReduce," Journal of KIIT, Vol. 9, No. 8, pp. 125-132, Aug. 2011.
- Y. H. Kim, E. N. Huh, "Personalized Analysis System for Enterprise Log Data Analysis," Korea Institute Of Information Security And Cryptology, Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 1149-1150, Jun. 2014.
- J. Y. Lee and S. Y. Kang, "Design and Verification of the Integrated Log Analysis System for Enterprise Information Security," Journal of Digital Contents Society, Vol. 9, No. 3, pp. 491-498, Sept. 2008.
- M. K. Baek and G. S. Lee, "A Study of Influence of Data Loss Prevention based on Contents", Department of Information and Communications Graduate School of Konkuk University, 2011.
- S. J. Park and J. I. Lim, "A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information," Journal of the Korea Institute of Information Security & Cryptology, pp. 637-644, Jun. 2012.
- D. S. Kim and S. R. Kim, "A Study on Monitoring Method about Information Leakage Sign using Application Log," Journal of Korean Institute of Information Technology, pp. 83-91, 2013
- M. B. Hyun, S. J. Lee, "The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 369-375, Apr. 2016. https://doi.org/10.13089/JKIISC.2016.26.2.369
- H. S. Ahn, E. J. Yoon, K. D. Bu, I. G. Nam, "Secure and Efficient DB Security and Authentication Scheme for RFID System," Korea Institute Of Communication Sciences, The Journal of The Korean Institute of Communication Sciences, Vol. 36, No. 4, pp. 197-206, Apr. 2011. https://doi.org/10.7840/KICS.2011.36C.4.197
- K. S. Yu, S. H. Im and H. B. KIM, "Technology trend and development direction of integrated log management system," Journal of the Korea Institute of Information Security & Cryptology, Vol. 23, No. 6, pp. 90-99, Dec. 2013.
- D. H. Seo, J. M. Baek, M. K, Lee, M. Y. Yoon and D. S. Cho, "Secure Knowledge Management for Prevent illegal data leakage by Internal users," Journal of Internet Computing and Services, Vol. 11, No. 2, pp. 73-84, Apr. 2010.