Acknowledgement
본 연구는 국토교통부/국토교통과학기술진흥원의 지원으로 수행되었음(과제번호 : RS-2020-KA158151)
References
- Hong, S.S., Shin, H.J., Hwang, U.H., Chae, H.S., 2019, Study on Suitability for Web Service of River Geospatial Information, Journal of the Korean Association of Geographic Information Studies 22(2):121-132
- Hyun, G.N., Park, N.J., 2023, A Study on the Law Analysis and the Application Method of the Personal Information Protection Act for the Promotion of Data Opening in Public Institutions. Journal of the Korean Institute of Information Technology, 9-11.
- Jeong, H.G., Kang, KT., 2022, Application monitoring system design and implementation using system call pattern, Journal of KIISE 32(10):795-801. https://doi.org/10.5626/JOK.2022.49.10.795
- Jang, Y.G, Jeong, J.H., Lee, J.W., Kim, H.S., 2009. A Study on Optimal Technical Factors of USFSS Based on Integrated Technique of Wireless Communication and Location Awareness, Journal of the Korean Association of Geographic Information Studies 12(4):48-58.
- Kim, B.S., Cho, J.S., 2018. Linux Kernel Attack of IoT Device using LKM-based System Call Hooking, Journal of the Korean Institute of Information Scientists and Engineers, 1195-1197.
- Kim, H.Y., Lee, S.H., 2008, A Study on the Application of Social Network Analysis for Expanding the use of Spatial Data in Local Government, Journal of the Korean Association of Geographic Information Studies 11(3):80-91.
- Kim. J.Y., Kim, H.J., Yu, G.Y., 2022, A Study on Effective Real Estate Big Data Management Method Using Graph Database Model, Journal of the Korean Association of Geographic Information Studies 25(4):163-180.
- Kim, S.S., Hong, C.S., 2014, Prevention of personal Information leakage through system call hooking in Android Kernel, Journal of the Korean Institute of Information Scientists and Engineers, 1,015-1,017.
- Lee, E.I., Kim, D.H., 2022, Serialization Method for large spatial data transmission of High Definition Map, Journal of the Korean Association of Geographic Information Studies 25(4):32-48.
- Lee, S.Y., Kim, H.G., Park, M.S.. 2022. Encryption key generation and encryption algorithm classification of encrypted data for smartphone app, Journal of the Korea Institute of Information Security & Cryptology, 32(6):17-22.
- USGS. 2015. Landsat 8(L8) Data Users Handbook. Department of the Interior US Geological Survey v1. https://www.usgs.gov/land-resources/nli/landsat/landsat-8-data-users-handbook. ( August 15, 2019)
- Zhang, Jun, SU, Purui, FENG, Dengguo, 2006, Design and implementation of intrusion detection system based on system-call, Journal of Computer Applications 26(9):2137-2139.