References
- Sitaram Kowtha, Laura A. Nolan, Rosemary A. Daley, 'Cyber Security Operation Center Characterization Model and Analysis', Johns Hopkins University, Applied Physics Laboratory, 978-1-4673-2709-1/12, IEEE, 2012.
- Eui-yeon Jung , 'A Study on the Integrated Security Monitoring &Control in Financial Investment Industry Computer Networks', Korea Information Processing Society, 19-2, Feb, 2012.
- Gil Sun, Yu, 'A Study on the Cyber Security monitoring Detection and Response', Department of Digital Forensics, The Graduate School of Hanseo University, August, 2018.
- Cyril Onwobiko, 'CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process', Intelligence & Security Assurance, E-Security Group, London, UK. 2018.
- Natalia Miloslavskaya, 'Network Security Intelligence Center as a combination of SIC and NOC', National Research Nuclear University MEPhI, 1877-0509/2018 Elsevier.
- Rasim Alguliyev, Yadigar Imamverdiyev, Lyudmila sukhostat, 'Cyber-physical systems and their security issues', Institute of Information Technology, Azerbaijan National Academy of Sciences, 0166-3615/2018 Elsevier.
- Tae-Woong Seo, 'An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control', Journal of Multimedia, 15(1), Jan, 2012.
- Kim, MinJun, 'A study on the implementation of white-list intrusion detection system on control networks', Department of Industry Security, Graduate School, Kyonggi Univ, Jun, 2011.
- Jin_Young Jung, 'Security Management Automation Method Using Artificial Intelligence in Financial Sector', KonKuk Univ, Master's Thesis, Feb, 2018.
- Charles Feng, Shuning Wu, Ningwei Liw, 'A User- Centric Machine Learning Framework for Cyber Security Operation Center', ZhonDu Tecnologies, Symantec Corporation, 978-1-5090-6727/17, IEEE, 2017.
- Hanbitmedia, "Network security system construction and security control",2016, pp. 38-42
- Infothebooks, "Security Control Practice Guide for Nurturing Next-Generation Information Security Talents", 2017, pp. 45-48.
- Jeon Sang June, "Design and Evaluation Security Control Iconology for Big Data Processing", JOURNAL OF PLATFORM TECHNOLOGY, 2020.12, pp. 38-46. https://doi.org/10.23023/JPT.2020.8.4.038
- Suk-woo Hyun, "A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database", Korea Institute Of Information Security And Cryptology, 2019.10, 1167-1177(11 pages)
- Woo-Jin Jo, "A log visualization method for network security monitoring", Korean Institute Of Smart Media, 2018, 70 - 78 (9 pages)
- Han ChoongHee, 'A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment ', Korea Information Assurance Society, vol 20-4, pp.187-196, Oct, 2020.