최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국산업정보학회논문지 = Journal of the Korea Industrial Information Systems Research, v.26 no.5, 2021년, pp.69 - 77
강다연 (동아대학교 경영정보학과)
This study aims to identify security-based threat information for an organization. This is because protecting the threat for IT systems plays an important role for an corporate's intangible assets. Security monitoring systems determine and consequently respond threats by analyzing them in a real tim...
Chanm, F. T. S. and Kumar, N. (2007). Global Supplier Development Considering Risk Factors using Fuzzy Extended AHP-based Approach, Omega, 35(4), 417-431.
Gartnet(2017), Innovation Insight for Security Orchestration, Automation and Response, White paper, 30 November.
Harker, D. T. and Vargas, L. G.(1987) The theory of ratio scale estimation: Satty's analytic hierarchy process, Management Science. 33(11), 1383-1403.
Hong, J. H. and Lee, B. Y. (2021). Artificial Intelligence-based Security Control Construction and Countermeasures, The Korea Contents Society, 21(1), 531-540.
Jeong, K. M. and Park, H. S. (2011). Design of a Security Monitoring System based on correlation analysis. KSCI review Conference, 335-338.
Jo, C. S. and Shin, Y. T. (2019). A Study on Improvement of Cyber Security Framework for Security Operations Center, Convergence security journal, 19(1), 111-120.
KISA (2020), KrCERT/CC publishes the trends of cyber threat for 2021 with AusCERT, CERT-In, and Sri Lanka CERT| CC, 07 Dec.
Kim, B. I. (2019). Automatic collection and analysis of cyber threat information, ICT R&D Trend, 31-37.
Lee, J. K. and Jo, I. J. (2021), Improvement Mechanism of Security Monitoring and Control Model Using Multiple Search Engines, The Korea Contents Society, 21(1), 284-291.
Lin, C. and Hsieh, P. J. (2004). A Fuzzy Decision Support System for Strategic Portfolio Management. Decision Support Systems, 38, 383-398.
Oh, Y. T. and Jo, I. J. (2019) Development of Integrated Security Control Service Model based on Artificial Intelligence Technology, Korea Contents Society, 19(1), 108-116.
Park, J. B., Choi, B. H. and Jo, H. S. (2018), A Study on the Activation of Cyber Threat Information Sharing, Journal of The Korean Institute of Communication Sciences, 35(7), 41-48.
Pi, D. K, Park, W. H. (2019). A study on Security Control & Monitoring Model of Industrial Security Threat in the Darkweb Environment, The Korea Association for Industrial Security, 9(1), 117-140.
Satty, T. L. (1990). How to Make a Decision: The Analytic Hierarchy Process, European Iournal of Operation Research, 48(1), 9-26.
So, H. C. and Kim, J. K.(2017). Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness, Journal of the Korea Industrial Information Systems Research, 22(4), 45-64.
Yonhapnews. (2021). Strengthening the prevention of cyber threats such as hacking, https://www.yna.co.kr(Accessed on Feb, 18th, 2021).
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.