최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.22 no.3, 2021년, pp.53 - 58
한충희 (Information Security Team, Korea Power Exchange) , 한창희 (Dept. of Computer Science, Korea Military Academy)
There is little research on actual business activities in the field of security control. Therefore, in this paper, we intend to present a practical research methodology that can contribute to the calculation of the size of the appropriate input personnel through the modeling of the threat informatio...
McMillan R. Definition: threat intelligence. Gartner; 2013. https://www.gartner.com/imagesrv/media-products/pdf/webroot/issue1_webroot.pdf
Chrismon D, Ruks M. Threat Intelligence: Collecting, analyzing, evaluating, MWR Infosecurity, UK Cert, United Kingdom; 2015. https://www.foo.be/docs/informations-sharing/Threat-Intelligence-Whitepaper.pdf
Dalziel H. How to define and build an effective cyber threat intelligence capability. Syngress Publishing of Elsevier; 2014. https://www.sciencedirect.com/book/9780128027301/how-to-define-and-build-an-effective-cyber-threat-intelligencecapability
Sitaram Kowtha, Laura A. Nolan, Rosemary A. Daley, 'Cyber Security Operation Center Characterization Model and Analysis', Johns Hopkins University, Applied Physics Laboratory, 978-1-4673-2709-1/12, IEEE, 2012. https://doi.org/10.1109/THS.2012.6459894
Eui-yeon Jung, 'A Study on the Integrated Security Monitoring &Control in Financial Investment Industry Computer Networks', Korea Information Processing Society, 19-2, Feb, 2012. https://www.koreascience.or.kr/article/CFKO201221868477405.jsp-kjSSMHB4&py2012&vncv27n6&sp588
Gil Sun, Yu, 'A Study on the Cyber Security monitoring Detection and Response', Department of Digital Forensics, The Graduate School of Hanseo University, August, 2018.
Tae-Woong Seo, 'An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control', Journal of Multimedia, 15(1), Jan, 2012.
Kim, MinJun, 'A study on the implementation of white-list intrusion detection system on control networks', Department of Industry Security, Graduate School, Kyonggi Univ, Jun, 2011.
Han Choong-Hee, 'Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry', Journal of the Korea Institute of Information Security and Cryptology 29(2), pp. 401~415, Apr, 2019. https://doi.org/10.13089/JKIISC.2019.29.2.401
Han Choong-Hee, "A Study on Cyber Threat Detection Response Analysis and Blocking Method", Doctor's Thesis, Department of Interdisciplinary Program of Information Security Graduate School of Chonnam National University, pp. 1~121. Aug, 2019.
Han Choong-Hee, "Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system", International Journal of Critical Infrastructure Protection, Volume 26, 100312, Sept. 2019. https://doi.org/10.1016/j.ijcip.2019.100312
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.