참고문헌
- R. F. Powers and G. W. Dickson, “MIS Project Management : Myths, Opinions and Reality,” California Management Review, Vol. 15, No. 3, pp. 147-156, Jan. 1971. DOI: 10.2307/41164448.
- ] Y. S. Jeong, Y. T. Kim and G. C. Park, “A Design of Service Improvement Model for Emergency Medical System using Augmented Reality,” Journal of Convergence Society for SMB, Vol. 7, No. 2, pp. 9-15, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.009
- J. Y. Lee and K. I. Kim, "The Effects of Accounting Service Worker's Professionalism and Accounting Information System's Level on the Quality of Customer's Accounting Information," Journal of Convergence Society for SMB, Vol. 6, No. 2, pp. 9-15, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.009
- L. Raymond and N. Magnenat-Talmann, “Information Systems in Small Business : Are They Used in Managerial Decision?,” American Journal of Small Business, Vol. 6, No. 4, pp. 20-26, Apr. 1982. https://doi.org/10.1177/104225878200600405
- F. Marc, M. Trevor, M. Devvie, E. Gerry, A. Teo, M. David, H. Kevin, B. Joseph, W. Paul, J. Eric and K. L. Mo, Symantec Internet Security Threat Report Trends for 2010, Symantec Corp., Vol. 16, Apr. 2011.
- L. Nataraj, S. Karthikeyan, G. Jacob and B. Manjunath, "Malware images: Visualization and automatic classification," Proceedings of the 8th International Symposium on Visualization for Cyber Security(VizSec '11), No. 4, pp. 1-15, Jul. 2011. DOI: 10.1145/2016904.2016908
- D. A. Quist and L. M. Liebrock, "Visualizing compiled executables for malware analysis," Proceedings of the 6th International Workshop on Visualization for Cyber Security, 2009 (VizSec 2009), pp. 27-32, 2009. DOI: 10.1109/VIZSEC.2009.5375539
- G. I. Kim, Y. C. Kim and J. K. Lee, "An Efficiency Authentication Security Mechanism of VANET in Highway," Journal of Convergence Society for SMB, Vol. 6, No. 2, Jun. 2016. DOI: 10.22156/CS4SMB.2016.6.2.009
- Y. S. Jeong, “A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment,” Journal of Convergence Society for SMB, Vol. 6, No. 1, pp. 33-38, Mar. 2016. DOI: 10.22156/CS4SMB.2016.6.1.033
- X. Jiang, X. Wang and D. Xu, "Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction," Proceedings of the 14th ACM conference on Computer and communications security (CCS '07), pp. 128-138, 2007. DOI: 10.1145/1315245.1315262
- V. P. Nair, H. Jain, Y. K. Golecha, M. S. Gaur and V. Laxmi, "MEDUSA: MEtamorphic malware dynamic analysis using signature from API," Proceedings of the 3rd international conference on Security of information and networks(SIN '10), pp. 263-269, 2010. DOI: 10.1145/1854099.1854152
- P. Trinius, T. Holz, J. Gobel And F. C. Freiling, "Visual analysis of malware behavior using treemaps and thread graphs," Proceedings of the 6th International Workshop on Visualization for Cyber Security 2009(VizSec 2009), pp. 33-38, 2009. DOI: 10.1109/VIZSEC.2009.5375540
- F. Y. Zhang, D. Y. Qi and J. L. Hu, "Using IRP for Malware Detection," Recent Advances in Intrusion Detection in Lecture Notes in Computer Science, Springer Berlin/Heidelberg, pp. 514-515, 2010. DOI: 10.1007/978-3-642-15512-3_39
- I. Ahmed and K. S. Lhee, "Classification of packet contents for malware detection," Journal in Computer Virology, pp. 279-295, 2011. DOI: 10.1007/s11416-011-0156-6
- M. Skrzewski, "Flow Based Algorithm for Malware Traffic Detection," Journal of the Computer Networks in Communications in Computer and Information Science, Springer Berlin Heidelberg, pp. 271-280, 2011. DOI: 10.1007/978-3-642-21771-5_29
- S. D. Yoo and K. D. Choi, "Research on the CBI, senior technology entrepreneurship promotion - Based on Finland Bridge Program-," Journal of digital Convergence, Vol. 13, No. 1, pp. 1-10, 2015. DOI : 10.14400/JDC.2015.13.1.1
- T. I. Han, "A Study on the Technical Evaluation of the Quality Certification for e-Learning Contents," Journal of digital Convergence, Vol. 13, No. 1, pp. 49-66, 2015. DOI : 10.14400/JDC.2015.13.1.49
- S. K. Kwon, "Legal Issues of Electronic Commerce Chapters of the Korea․US FTA and Tasks of the Digital Contents Industry," Journal of digital Convergence, Vol. 13, No. 5, pp. 21-29, May. 2015. DOI : 10.14400/JDC.2015.13.5.21
- Y. K. Lee and K. H. Youn, "Searching Role of Government for Promoting IoT Industry -Utilizing Importance of Individual Sub-Policies using AHP-," Journal of the Korea Convergence Society, Vol. 14. No. 5, pp. 47-55, May. 2016. DOI: 10.14400/JDC.2016.14.5.47
- Y. I. Kim, Yeong-Chang Choe, Yun-Jin Choi, “A study on the Convergence Factors Which Influence on the Sustainability of Volunteer Activities -Focused on Ansan Volunteer Center-,” Journal of digital Convergence, Vol. 13, No. 10, pp. 41-50, 2015. DOI: 10.14400/JDC/2015.13.10.41
- H. L. Roh and M. N. Choi, "A study the convergent effects of team interaction and team metacognition affecting a continuous participation in university learning community," Journal of digital Convergence, Vol. 14, No. 4, pp. 69-78, 2016. DOI: 10.14400/JDC.2016.14.4.69