최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Information Systems Review, v.9 no.3, 2007년, pp.83 - 98
장항배 (대진대학교 경영학과) , 김경규 (연세대학교 정보대학원) , 이시진 (대진대학교 컴퓨터공학과)
This study focused on online game security, which has been considered relatively insignificant when compared to the online game industry's rapid growth. In this study, the state of security incidents in the Korean game industry and security solutions for such cases were examined. At first the securi...
정윤경, 기준백, 천정희, '온라인 게임 아이템의 안전한 전자 거래 시스템', 한국정보보호학회논문지, 제13권, 제3호, 2003
중소기술정보진흥원, '중소기업 정보화 역기능 실태조사 연구', 2004
한국정보보호진흥원, '정보화 역기능 실태조사 연구', 2003
한국정보보호진흥원, '정보화 역기능 실태조사 연구', 2004
한국게임산업진흥원, '2005년 대한민국 게임백서', 2005
Abbott, R. P., J. S. Chin, J. E. Donnelley, W. L. Konigsford, S. Tokubo, and D. A. Webb, 'Security Analysis and Enhancements of Computer Operating Systems', Institute for Computer Sciences and Technology, National Bureau of Standards, 1976
Aslam, T., 'A Taxonomy of Security Faults in the Unix Operating System', Master's Thesis, Purdue University, 1995
Bisbey, II R, Hollingworth D., 'Protection Analysis: Final Report', University of Southern California, 1978
Bishop, M., 'A Taxonomy of UNIX System and Network Vulnerabilities', Technical Report CSE-95-10, Purdue University, 1995
Bishop, M. and D. Bailey, 'A Critical Analysis of Vulnerability Taxonomies', Technical Report CSE-96-11, Dept. of Computer Science, University of California at Davis, 1996
Brian, Marick, 'A Survey of Software Fault Surveys', Technical Report UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, 1990
Eugene, H. Spafford, 'Common System Vulnerabilities', Proceedings of the Workshop on Future Directions in Computer Misuse and Anomaly Detection, 1992
Howard, J. D., 'An Analysis of Security Incidents on the Internet', Ph. D Thesis, Carnegie Mellon University, 1997
Lough, D. L., 'A Taxonomy of Computer Attacks with Applications to Wireless Networks', Ph. D. Thesis, Virginia Polytechnic Institute and State University, 2001
Otwell, K. and B. Aldridge, 'The Role of Vulnerability in Risk Management', IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, 1989
Peltier, T., 'Information Security Risk Analysis', Auerbach, 2001
Rajeev Nagar, 'Windows NT File System Internals: A Developer's Guide', O'Reilly & Associates, 1997
Ray, Hunt and Simon, Hansman, 'A Taxonomy of Network and Computer Attacks', Computer & Security, Vol.24, No.1, 2005
Wenliang, Du and Aditya, P. Mathur, 'Categorization of Software Errors that led to Security Breaches', In Proceeding of the 21st National Information Systems Security Conference (NISSC'98), 1998
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.