| 1 |
Exploring a national cybersecurity exercise for universities  |
미소장 |
| 2 |
Taek Lee, Dohoon Kim, Yeonkyun Shin, Seungyong Shin, and Hoh Peter In, "An Architecture of Virtual Security Training Laboratory for Cybersecurity Exercise," Proceedings of The 30th Korea Information Processing Society Fall Conference, vol.15, no.2, pp.1462-1464, Nov. 2008. |
미소장 |
| 3 |
Ji Hu, Christoph Meinel, and Michael Schmitt, "Tele-lab IT security: an architecture for interactive lessons for security education," Proceedings of the 35th SIGCSE technical symposium on Computer science education, 2004. |
미소장 |
| 4 |
Jeremiah K. Jones and Gordon W. Romney, "Honeynets: an educational resource for IT security, Proceedings of the 5th conference on Information technology education, 2004. |
미소장 |
| 5 |
Online information security e-learning center (http:// www.sis.or.kr) |
미소장 |
| 6 |
Alfredo Milani, Judit Jasso, and Silvia Suriani, "Modeling Online User Behavior," IEEE International Conference on e-Business Engineering, pp.22-24, Oct. 2008. |
미소장 |
| 7 |
Jose A. Iglesias, Plamen Angelov, Agapito Ledezma, and Araceli Sanchis, "Modeling Evolving User Behaviours," Evolving and Self-Developing Intelligent Systems, 2009. |
미소장 |
| 8 |
Ashish Garg, Ragini Rahalkar, Shambhu Upadhyaya, and Kevin Kwiat, "Profiling Users in GUI based Systems for Masquerade Detection," IEEE Information Assurance Workshop, pp.48-54, 2006. |
미소장 |
| 9 |
Debin Gao, Michael K. Reiter, and Dawn Song, "Behavioral Distance for Intrusion Detection," RAID 2005, LNCS 3858. |
미소장 |