1 허진경, "암호화와 PKI를 이용한 웹 어플리케이션 인증시스템" 한국융합보안학회 8 (8): 1-7, 2008
2 이해동, "신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계" 한국정보통신학회 16 (16): 2649-2656, 2012
3 R-W. Huang, "Privacy-preserving computable encryption scheme of cloud computing" 34 (34): 2391-2402, 2011
4 Y-Z. Wang, "Network big data: Present and future" 36 (36): 2013
5 C-S. Yi, "DDos detecting model of cloud computing environment" 4-6, 2015
6 J. H. Sun, "Cloud computing in the vulerability analysis for personal information security" 10 (10): 77-82, 2010
7 O.Chen, "Cloud computing and its key techniques" 29 (29): 2562-2567, 2009
8 S. Curry, "Big data fuels intelligence-driven security"
9 J. z. Li, "An important aspectt of big data: Data usability" School of Computer Science and Technology, Harbin Institute of Technology 1147-1162, 2013
10 YanTing Mu, "A Proposal of a Defense Model for the Abnormal Data Collection using Trace Back Information in Big Data Environments" 한국지식정보기술학회 10 (10): 153-162, 2015
1 허진경, "암호화와 PKI를 이용한 웹 어플리케이션 인증시스템" 한국융합보안학회 8 (8): 1-7, 2008
2 이해동, "신뢰 호스트 상호 협력을 통한 IP 스푸핑 공격의 효율적 탐지 및 방어 모델 설계" 한국정보통신학회 16 (16): 2649-2656, 2012
3 R-W. Huang, "Privacy-preserving computable encryption scheme of cloud computing" 34 (34): 2391-2402, 2011
4 Y-Z. Wang, "Network big data: Present and future" 36 (36): 2013
5 C-S. Yi, "DDos detecting model of cloud computing environment" 4-6, 2015
6 J. H. Sun, "Cloud computing in the vulerability analysis for personal information security" 10 (10): 77-82, 2010
7 O.Chen, "Cloud computing and its key techniques" 29 (29): 2562-2567, 2009
8 S. Curry, "Big data fuels intelligence-driven security"
9 J. z. Li, "An important aspectt of big data: Data usability" School of Computer Science and Technology, Harbin Institute of Technology 1147-1162, 2013
10 YanTing Mu, "A Proposal of a Defense Model for the Abnormal Data Collection using Trace Back Information in Big Data Environments" 한국지식정보기술학회 10 (10): 153-162, 2015