References
- K. S. Min, K. Y. Kim, and J. S. Park et al., “Forecast and analysis of cyber security threats, Metaverse, NFTs,” KISA Insight, Vol. 4, 2022.
- Metaverse Korea. "What's the Metaverse?", https://metaverse-korea.net/coin/nft%EB%9E%80-%EB%AC%B4% EC%97%87%EC%9D%BC% EA%B9%8C-non-fungible-tocken%EA%B3%BC-%EB%A9%94%ED%83%80%EB%B2%84%EC%8A%A4/.
- MIT Technology Review, "What's the Metaverse?" https://www.technologyreview.kr/what-isnft/?gclid=EAIaIQobChMIgMP1u6Tn_AIV9Z7CCh1n0AyYEAMYASAAEgJ5ofD_BwE.
- CIO Korea. "NFT market to grow 35% annually by 2027... Estimated market size of $13.6 billion in 2027", https://www.ciokorea.com/tags/87955/%EB%A7%88%EC%BC%93%EC%95%A4%EB%A7%88%EC%BC%93/249538.
- Korean Government's Brief of Policy. https://www.korea.kr/news/policyNewsView.do? newsId=156523436.
- Wikipedia. Non-fungible token, https://ko.wikipedia.org/wiki/%EB%8C%80%EC%B2%B4_%EB%B6%88%EA%B0%80%EB%8A%A5_%ED%86%A0%ED%81%B0.
- Q. Wang, R. Li, and Q. Wang et al., "Non-fungible token (NFT): Overview, evaluation, opportunities and challenges," Oct 2021.
- Metaverse Korea. "NFT 2.0", https://metaverse-korea.net/meataverse/nft-20-%EC%A0%95%EC%9D%98-%ED%8A%B9%EC%A7%95-%EC%82%AC%EB%A1%80-nft-0%EA%B3%BC%EC%9D%98-%EC% B0%A8%EC%9D% B4%EC%A0%90/.
- N. Huq, R. Reyes, and P. Lin et al., "METAVERSE OR METAWORSE? Cybersecurity Threats Against the Internet of Experiences," Trend Micro Research, 2022.
- S. H. Jung and C. M. Lee, "A Study on the Analysis of Security Threats of NFT Transaction in Korea," Korean Journal of Industry Security (KAIS), Apr 2022. DOI: https://doi.org/10.33388/kais.2022.12.1.293
- S. Bhujel and Y. Rahulamathavan, "A Survey: Security, Transparency, and Scalability Issues of NFT's and Its Marketplaces," Journal of Sensors, Vol. 22, No. 8833, Nov 2022. DOI: https://doi.org/10.3390/s22228833
- Y. Gupta and J. Kumar, "Identifying Security Risks in NFT Platforms," Mar 2022. DOI: https://doi.org/10.48550/arXiv.2204.01487
- W. Rehman, H. E Zainab, and J. Imran et al., "NFTs: Applications and challenges," IEEE 22nd International Arab Conference on Information Technology (ACIT), pp. 1-7, Dec 2021. DOI: https://doi.org/10.1109/ACIT53391.2021.9677260
- D. Das, P. Bose, and N. Ruaro et al., "Understanding Security Issues in the NFT Ecosystem," Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021. DOI: https://doi.org/10.1145/3548606.3559342
- J. Kim and K. U. Kim, "Non-Fungible Token-based Virtual Avatar for User Identification in the Metaverse," Journal of KIISE (JOK), Vol. 49, No. 11, pp. 1032-1042, Nov 2022. DOI: https://doi.org/10.5626/JOK.2022.49.11.1032
- Y. S. Shim, "A Study on Utilization Methods and Problems according to Metaverse Platform Analysis," Journal of the Convergence on Culture Technology (JCCT), Vol. 8, No. 6, pp. 855-860, Nov 2022. DOI: https://doi.org/10.17703/JCCT.2022.8.6.855