메뉴 건너뛰기




Volumn 274 LNEE, Issue , 2014, Pages 489-494

Analysis of cyber attacks and security intelligence

Author keywords

APT; Cyber Attacks; MBR; Security Intelligence; Threat

Indexed keywords

COMPUTER CRIME; DIGITAL STORAGE; INDUSTRY; INTELLIGENT COMPUTING; NETWORK SECURITY;

EID: 84958533802     PISSN: 18761100     EISSN: 18761119     Source Type: Book Series    
DOI: 10.1007/978-3-642-40675-1_73     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 2
    • 77955860747 scopus 로고    scopus 로고
    • The importance of corporate forensic readiness in the information security framework
    • Pangalos, G., et al. The Importance of Corporate Forensic Readiness in the information security framework. In: 2010 Workshops on Enabling Technologies (2010
    • (2010) 2010 Workshops on Enabling Technologies
    • Pangalos, G.1
  • 3
    • 84893108391 scopus 로고    scopus 로고
    • Zero-day attack, https://en.wikipedia.org/wiki/Zero-day-attack
    • Zero-day attack
  • 4
    • 84995278052 scopus 로고    scopus 로고
    • Rootkit, http://en.wikipedia.org/wiki/Rootkit
    • Rootkit
  • 7
    • 33745653332 scopus 로고    scopus 로고
    • Wipi mobile platform with secure service for mobile rfid network environment
    • Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds. Springer, Heidelberg
    • Park, N., Kwak, J., Kim, S., Won, D., Kim, H. WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741-748. Springer, Heidelberg (2006
    • (2006) APWeb Workshops 2006. LNCS , vol.3842 , pp. 741-748
    • Park, N.1    Kwak, J.2    Kim, S.3    Won, D.4    Kim, H.5
  • 8
    • 78649423092 scopus 로고    scopus 로고
    • Security scheme for managing a large quantity of individual information in RFID environment
    • Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds. Springer, Heidelberg
    • Park, N. Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72-79. Springer, Heidelberg (2010
    • (2010) ICICA 2010. CCIS , vol.106 , pp. 72-79
    • Park, N.1
  • 9
    • 80053072404 scopus 로고    scopus 로고
    • Secure uhf/hf dual-band rfid: Strategic framework approaches and application solutions
    • Jȩdrzejowicz, P., Nguyen, N.T., Hoang, K. (eds. Springer, Heidelberg
    • Park, N. Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jȩdrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488-496. Springer, Heidelberg (2011
    • (2011) ICCCI 2011, Part I. LNCS , vol.6922 , pp. 488-496
    • Park, N.1
  • 10
    • 80053074547 scopus 로고    scopus 로고
    • Implementation of terminal middleware platform for mobile rfid computing
    • Park, N. Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205-219 (2011
    • (2011) International Journal of Ad Hoc and Ubiquitous Computing , vol.8 , Issue.4 , pp. 205-219
    • Park, N.1
  • 11
    • 78649572669 scopus 로고    scopus 로고
    • Harmful adult multimedia contents filtering method in mobile rfid service environment
    • Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds. Springer, Heidelberg
    • Park, N., Kim, Y. Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193-202. Springer, Heidelberg (2010
    • (2010) ICCCI 2010, Part II. LNCS (LNAI , vol.6422 , pp. 193-202
    • Park, N.1    Kim, Y.2
  • 12
    • 78649566523 scopus 로고    scopus 로고
    • Aont encryption based application data management in mobile rfid environment
    • Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds. Springer, Heidelberg
    • Park, N., Song, Y. AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142-152. Springer, Heidelberg (2010
    • (2010) ICCCI 2010, Part II. LNCS (LNAI , vol.6422 , pp. 142-152
    • Park, N.1    Song, Y.2
  • 13
    • 80053458971 scopus 로고    scopus 로고
    • Customized healthcare infrastructure using privacy weight level based on smart device
    • Lee, G., Howard, D., Ślȩzak, D. (eds. Springer, Heidelberg
    • Park, N. Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślȩzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467-474. Springer, Heidelberg (2011
    • (2011) ICHIT 2011. CCIS , vol.206 , pp. 467-474
    • Park, N.1
  • 14
    • 80052330084 scopus 로고    scopus 로고
    • Secure data access control scheme using type-based re-encryption in cloud environment
    • Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds. Springer, Heidelberg
    • Park, N. Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319-327. Springer, Heidelberg (2011
    • (2011) Semantic Methods. SCI , vol.381 , pp. 319-327
    • Park, N.1
  • 15
    • 79960965290 scopus 로고    scopus 로고
    • Enterprise data loss prevention system having a function of coping with civil suits
    • Lee, R. (ed. Springer, Heidelberg
    • Kim, Y., Park, N., Hong, D. Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers,Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201-208. Springer, Heidelberg (2011
    • (2011) Computers,Networks, Systems, and Industrial Engineering 2011. SCI , vol.365 , pp. 201-208
    • Kim, Y.1    Park, N.2    Hong, D.3
  • 16
    • 50249112176 scopus 로고    scopus 로고
    • Privacy-enhanced adult certification method for multimediacontents on mobile rfid environments
    • IEEE, Los Alamitos
    • Kim, Y., Park, N., Won, D. Privacy-Enhanced Adult Certification Method for MultimediaContents on Mobile RFID Environments. In: Proc. of IEEE International Symposium onConsumer Electronics, pp. 1-4. IEEE, Los Alamitos (2007
    • (2007) Proc. of IEEE International Symposium onConsumer Electronics , pp. 1-4
    • Kim, Y.1    Park, N.2    Won, D.3
  • 17
    • 78649583760 scopus 로고    scopus 로고
    • Adult certification system on mobile rfid serviceenvironments
    • Kim, Y., Park, N., Hong, D., Won, D. Adult Certification System on Mobile RFID ServiceEnvironments. Journal of Korea Contents Association 9(1), 131-138 (2009
    • (2009) Journal of Korea Contents Association , vol.9 , Issue.1 , pp. 131-138
    • Kim, Y.1    Park, N.2    Hong, D.3    Won, D.4
  • 18
    • 77958482600 scopus 로고    scopus 로고
    • Secure rfid application data management using all-or-nothing transform encryption
    • Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds. Springer, Heidelberg
    • Park, N., Song, Y. Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245-252. Springer, Heidelberg (2010
    • (2010) WASA 2010. LNCS , vol.6221 , pp. 245-252
    • Park, N.1    Song, Y.2
  • 19
    • 84865983605 scopus 로고    scopus 로고
    • The implementation of open embedded s/w platform for secure mobile rfid reader
    • Park, N. The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785-793 (2010
    • (2010) The Journal of Korea Information and Communications Society , vol.35 , Issue.5 , pp. 785-793
    • Park, N.1
  • 20
    • 84865969179 scopus 로고    scopus 로고
    • Mobile rfid/nfc linkage based on uhf/hf dual band?s integration in u-sensor network era
    • Park, J.J. (J.H.), Kim, J., Zou, D., Lee, Y.S. (eds. Springer, Heidelberg
    • Park, N. Mobile RFID/NFC Linkage Based on UHF/HF Dual Band?s Integration in U-Sensor Network Era. In: Park, J.J. (J.H.), Kim, J., Zou, D., Lee, Y.S. (eds.) ITCS & STA 2012. LNEE, vol. 180, pp. 265-271. Springer, Heidelberg (2012
    • (2012) ITCS & STA 2012. LNEE , vol.180 , pp. 265-271
    • Park, N.1
  • 21
    • 80052330084 scopus 로고    scopus 로고
    • Secure data access control scheme using type-based re-encryption in cloud environment
    • Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds. Springer, Heidelberg
    • Park, N. Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319-327. Springer, Heidelberg (2011
    • (2011) Semantic Methods. SCI , vol.381 , pp. 319-327
    • Park, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.