메뉴 건너뛰기




Volumn 37, Issue 8, 2017, Pages 1606-1627

Security Events and Vulnerability Data for Cybersecurity Risk Estimation

Author keywords

Attack likelihood; cybersecurity events; quantitative risk; vulnerabilities

Indexed keywords

ESTIMATION; NETWORK SECURITY; RISK ASSESSMENT; RISKS;

EID: 85027396040     PISSN: 02724332     EISSN: 15396924     Source Type: Journal    
DOI: 10.1111/risa.12864     Document Type: Article
Times cited : (79)

References (106)
  • 3
    • 80051749786 scopus 로고    scopus 로고
    • Correlated failures, diversification, and information security risk management
    • Chen Py, Kataria G, Krishnan R. Correlated failures, diversification, and information security risk management. MIS Quarterly: Management Information Systems, 2011; 35(2): 397–422.
    • (2011) MIS Quarterly: Management Information Systems , vol.35 , Issue.2 , pp. 397-422
    • Chen, P.1    Kataria, G.2    Krishnan, R.3
  • 4
    • 3042755044 scopus 로고    scopus 로고
    • How useful is quantitative risk assessment
    • Apostolakis GE. How useful is quantitative risk assessment? Risk Analysis, 2004; 24(3):515–520.
    • (2004) Risk Analysis , vol.24 , Issue.3 , pp. 515-520
    • Apostolakis, G.E.1
  • 6
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 2005; 16(1):28–46.
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 12
    • 85027409843 scopus 로고    scopus 로고
    • OSVDB,, Accessed November 2016
    • Martin B. A note on the Verizon DBIR 2016 vulnerabilities claims. OSVDB, 2016. https://doi.org/blog.osvdb.org/2016/04/27/a-note-on-the-verizon-dbir-2016-vulnerabilities-claims/. Available at: https://doi.org/blog.osvdb.org/2016/04/27/a-note-on-the-verizon-dbir-2016-vulnerabilities-claims/, Accessed November 2016.
    • (2016) A note on the Verizon DBIR 2016 vulnerabilities claims
    • Martin, B.1
  • 14
    • 42249094900 scopus 로고    scopus 로고
    • What's wrong with risk matrices
    • Anthony Tony Cox L. What's wrong with risk matrices? Risk Analysis, 2008; 28(2):497–512.
    • (2008) Risk Analysis , vol.28 , Issue.2 , pp. 497-512
    • Anthony Tony Cox, L.1
  • 15
    • 84924567598 scopus 로고    scopus 로고
    • Recommendations on the use and design of risk matrices
    • Duijm NJ. Recommendations on the use and design of risk matrices. Safety Science, 2015; 76:21–31.
    • (2015) Safety Science , vol.76 , pp. 21-31
    • Duijm, N.J.1
  • 18
    • 77955425114 scopus 로고    scopus 로고
    • Quantifying security risk level from CVSS estimates of frequency and impact
    • Houmb SH, Franqueira VN, Engum EA. Quantifying security risk level from CVSS estimates of frequency and impact. Journal of Systems and Software, 2010; 83(9):1622–1634.
    • (2010) Journal of Systems and Software , vol.83 , Issue.9 , pp. 1622-1634
    • Houmb, S.H.1    Franqueira, V.N.2    Engum, E.A.3
  • 22
    • 84928107846 scopus 로고    scopus 로고
    • Security triage: A report of a lean security requirements methodology for cost-effective security analysis
    • i
    • Giacalone M, Mammoliti R, Massacci F, Paci F, Perugino R, Selli C. Security triage: A report of a lean security requirements methodology for cost-effective security analysis. Pp. 25–27 in Proc. of ACM/IEE ESEM'14, 2014.
    • (2014) Proc. of ACM/IEE ESEM'14 , pp. 25-27
    • Giacalone, M.1    Mammoliti, R.2    Massacci, F.3    Paci, F.4    Perugino, R.5    Selli, C.6
  • 24
    • 0036668726 scopus 로고    scopus 로고
    • Risk analysis and risk management in an uncertain world
    • Accessed April 2017
    • Kunreuther H. Risk analysis and risk management in an uncertain world. Risk Analysis, 2002; 22(4):655–664. Available at: https://doi.org/10.1111/0272-4332.00057, Accessed April 2017.
    • (2002) Risk Analysis , vol.22 , Issue.4 , pp. 655-664
    • Kunreuther, H.1
  • 25
    • 84979305344 scopus 로고    scopus 로고
    • Best practices for building a security operations center
    • Kelley D, Moritz R. Best practices for building a security operations center. Information Systems Security, 2006; 14(6): 27–32.
    • (2006) Information Systems Security , vol.14 , Issue.6 , pp. 27-32
    • Kelley, D.1    Moritz, R.2
  • 26
    • 84890854996 scopus 로고    scopus 로고
    • 1–7 in, Venter HS, Loock M, Coetzee M, (eds). 2013 Information Security for South Africa., Johannesburg, South Africa, IEE
    • Jacobs P, Arnab A, Irwin B. Classification of security operation centers. Pp. 1–7 in Venter HS, Loock M, Coetzee M (eds). 2013 Information Security for South Africa. Johannesburg, South Africa: IEEE, 2013.
    • (2013) Classification of security operation centers
    • Jacobs, P.1    Arnab, A.2    Irwin, B.3
  • 27
    • 79953037043 scopus 로고    scopus 로고
    • On some recent definitions and analysis frameworks for risk, vulnerability, and resilience
    • Aven T. On some recent definitions and analysis frameworks for risk, vulnerability, and resilience. Risk Analysis, 2011; 31(4):515–522.
    • (2011) Risk Analysis , vol.31 , Issue.4 , pp. 515-522
    • Aven, T.1
  • 28
    • 67649548424 scopus 로고    scopus 로고
    • Choice and chance: A conceptual model of paths to information security compromise
    • Ransbotham S, Mitra S. Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 2009; 20:121–139.
    • (2009) Information Systems Research , vol.20 , pp. 121-139
    • Ransbotham, S.1    Mitra, S.2
  • 30
    • 84926442736 scopus 로고    scopus 로고
    • Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models
    • Rao NS, Poole SW, Ma CY, He F, Zhuang J, Yau DK. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Analysis, 2016; 36(4):694–710.
    • (2016) Risk Analysis , vol.36 , Issue.4 , pp. 694-710
    • Rao, N.S.1    Poole, S.W.2    Ma, C.Y.3    He, F.4    Zhuang, J.5    Yau, D.K.6
  • 31
    • 80053384354 scopus 로고    scopus 로고
    • A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management
    • Merrick J, Parnell GS. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Risk Analysis, 2011; 31(9):1488–1510.
    • (2011) Risk Analysis , vol.31 , Issue.9 , pp. 1488-1510
    • Merrick, J.1    Parnell, G.S.2
  • 32
    • 79951522406 scopus 로고    scopus 로고
    • How probabilistic risk assessment can mislead terrorism risk analysts
    • Brown GG, Cox Jr LAT. How probabilistic risk assessment can mislead terrorism risk analysts. Risk Analysis, 2011; 31(2):196–204.
    • (2011) Risk Analysis , vol.31 , Issue.2 , pp. 196-204
    • Brown, G.G.1    Cox, L.A.T.2
  • 33
    • 84869141956 scopus 로고    scopus 로고
    • Verizon,, Accessed November 2016
    • Verizon. 2016 Data Breach Investigation Report. Verizon, 2016. Available at: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/, Accessed November 2016.
    • (2016) 2016 Data Breach Investigation Report
  • 35
    • 84869494073 scopus 로고    scopus 로고
    • On “black swans” and “perfect storms”: Risk analysis and management when statistics are not enough
    • Paté-Cornell E. On “black swans” and “perfect storms”: Risk analysis and management when statistics are not enough. Risk Analysis, 2012; 32(11):1823–1833.
    • (2012) Risk Analysis , vol.32 , Issue.11 , pp. 1823-1833
    • Paté-Cornell, E.1
  • 36
    • 80052169144 scopus 로고    scopus 로고
    • Advanced persistent threats and how to monitor and deter them
    • Tankard C. Advanced persistent threats and how to monitor and deter them. Network Security, 2011; 2011(8):16–19.
    • (2011) Network Security , vol.2011 , Issue.8 , pp. 16-19
    • Tankard, C.1
  • 40
    • 84869141956 scopus 로고    scopus 로고
    • Verizon, 2015., Accessed Novembe
    • Verizon. 2015 Data Breach Investigations Report. Verizon, 2015. Available at: http://www.verizon.com/about/news/2015-data-breach-report-info/, Accessed November 2016.
    • (2016) 2015 Data Breach Investigations Report
  • 42
    • 85027416961 scopus 로고    scopus 로고
    • TrendMicro,, Accessed November 2016
    • TrendMicro. Exploit Kit. TrendMicro, 2016. Available at: http://www.trendmicro.com/vinfo/us/security/definition/exploit-kit, Accessed November 2016.
    • (2016) Exploit Kit
  • 43
    • 84893098033 scopus 로고    scopus 로고
    • Preliminary analysis of exploit kits as software artefacts., in Proc. of ESSoS 201
    • Kotov V, Massacci F. Anatomy of exploit kits. Preliminary analysis of exploit kits as software artefacts. Pp. 181–196 in Proc. of ESSoS 2013, 2013.
    • (2013) Anatomy of exploit kits , pp. 181-196
    • Kotov, V.1    Massacci, F.2
  • 44
    • 85027401032 scopus 로고    scopus 로고
    • Sophos, editor., Sophos,, Accessed November 2016
    • Sophos. Sophos, editor. Location-based threats: How cybercriminals target you based on where you live. Sophos, 2016. Available at: https://doi.org/blogs.sophos.com/2016/05/03/location-based-ransomware-threat-research/, Accessed November 2016.
    • (2016) Location-based threats: How cybercriminals target you based on where you live
  • 46
    • 84924049184 scopus 로고    scopus 로고
    • in Proceedings of the 2015 Engineering Secure Software and Systems Conference (ESSoS'15
    • Allodi L. The Heavy Tails of Vulnerability Exploitation. Pp. 133–148 in Proceedings of the 2015 Engineering Secure Software and Systems Conference (ESSoS'15), 2015.
    • (2015) The Heavy Tails of Vulnerability Exploitation , pp. 133-148
    • Allodi, L.1
  • 48
    • 84908223993 scopus 로고    scopus 로고
    • The operational role of security information and event management systems
    • Bhatt S, Manadhata PK, Zomlot L. The operational role of security information and event management systems. IEEE Security Privacy, 2014; 12(5):35–41.
    • (2014) IEEE Security Privacy , vol.12 , Issue.5 , pp. 35-41
    • Bhatt, S.1    Manadhata, P.K.2    Zomlot, L.3
  • 50
    • 0003669844 scopus 로고    scopus 로고
    • 310002009, ISO/IE
    • ISO/IEC. 31000:2009: Risk Management. ISO/IEC, 2009.
    • (2009) Risk Management
  • 54
    • 84885068202 scopus 로고    scopus 로고
    • Committee of Sponsoring Organizations of the Treadway Commissio
    • Curtis P, Carey M. Risk assessment in practice. Committee of Sponsoring Organizations of the Treadway Commission, 2012. Available at: http://www.coso.org.
    • (2012) Risk assessment in practice
    • Curtis, P.1    Carey, M.2
  • 55
    • 84959105324 scopus 로고    scopus 로고
    • National and Global risk studies: How can the field of risk analysis contribute
    • Accessed April 2017
    • Aven T, Cox LA. National and Global risk studies: How can the field of risk analysis contribute? Risk Analysis, 2016; 36(2):186–190. Available at: https://doi.org/10.1111/risa.12584, Accessed April 2017.
    • (2016) Risk Analysis , vol.36 , Issue.2 , pp. 186-190
    • Aven, T.1    Cox, L.A.2
  • 56
    • 85027397624 scopus 로고    scopus 로고
    • Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0. NIS
    • Quinn SD, Scarfone KA, Barrett M, Johnson CS. SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0. NIST, 2010.
    • (2010) SP 800-117
    • Quinn, S.D.1    Scarfone, K.A.2    Barrett, M.3    Johnson, C.S.4
  • 57
    • 84928659254 scopus 로고    scopus 로고
    • in Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE'14
    • Naaliel M, Joao D, Henrique M. Security benchmarks for web serving systems. Pp. 1–12 in Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE'14), 2014.
    • (2014) Security benchmarks for web serving systems , pp. 1-12
    • Naaliel, M.1    Joao, D.2    Henrique, M.3
  • 58
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha A, Park JM. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 2007; 51(12):3448–3470.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 59
    • 84905054609 scopus 로고    scopus 로고
    • Foundational issues in risk assessment and risk management
    • Aven T, Zio E. Foundational issues in risk assessment and risk management. Risk Analysis, 2014; 34(7):1164–1172.
    • (2014) Risk Analysis , vol.34 , Issue.7 , pp. 1164-1172
    • Aven, T.1    Zio, E.2
  • 61
    • 33750093555 scopus 로고    scopus 로고
    • 109–137 in, Lee Dt, Shieh SP, Tygar JD, (eds). Computer Security in the 21st Century., Boston, MA, Springer U
    • Howard M, Pincus J, Wing JM. Measuring relative attack surfaces. Pp. 109–137 in Lee Dt, Shieh SP, Tygar JD (eds). Computer Security in the 21st Century. Boston, MA: Springer US, 2005.
    • (2005) Measuring relative attack surfaces
    • Howard, M.1    Pincus, J.2    Wing, J.M.3
  • 63
    • 67349177466 scopus 로고    scopus 로고
    • Hierarchical, model-based risk management of critical infrastructures
    • Baiardi F, Telmon C, Sgandurra D. Hierarchical, model-based risk management of critical infrastructures. Reliability Engineering & System Safety, 2009; 94(9):1403–1415.
    • (2009) Reliability Engineering & System Safety , vol.94 , Issue.9 , pp. 1403-1415
    • Baiardi, F.1    Telmon, C.2    Sgandurra, D.3
  • 68
    • 64749095206 scopus 로고    scopus 로고
    • Optimal security hardening using multi-objective optimization on attack tree models of networks
    • in, CCS '07., ACM, Available from, Accessed April 2017
    • Dewri R, Poolsappasit N, Ray I, Whitley D. Optimal security hardening using multi-objective optimization on attack tree models of networks. Pp. 204–213 in Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS '07. ACM, 2007. Available from: https://doi.acm.org/10.1145/1315245.1315272, Accessed April 2017.
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security , pp. 204-213
    • Dewri, R.1    Poolsappasit, N.2    Ray, I.3    Whitley, D.4
  • 69
    • 84894561473 scopus 로고    scopus 로고
    • A large-scale study of the time required to compromise a computer system
    • Holm H. A large-scale study of the time required to compromise a computer system. IEEE Transactions on Dependable and Secure Computing, 2014; 11(1):2–15.
    • (2014) IEEE Transactions on Dependable and Secure Computing , vol.11 , Issue.1 , pp. 2-15
    • Holm, H.1
  • 70
    • 58849103145 scopus 로고    scopus 로고
    • A comprehensive network security risk model for process control networks
    • Henry MH, Haimes YY. A comprehensive network security risk model for process control networks. Risk Analysis, 2009; 29(2):223–248.
    • (2009) Risk Analysis , vol.29 , Issue.2 , pp. 223-248
    • Henry, M.H.1    Haimes, Y.Y.2
  • 73
    • 42549101645 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    • in, 2007., IEE
    • Ten CW, Liu CC, Govindarasu M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees. Pp. 1–8 in Power Engineering Society General Meeting, 2007. IEEE, 2007.
    • (2007) Power Engineering Society General Meeting , pp. 1-8
    • Ten, C.W.1    Liu, C.C.2    Govindarasu, M.3
  • 81
    • 85027413848 scopus 로고    scopus 로고
    • NTIA,, Accessed December 2016
    • NTIA. NTIA vulnerability disclosure call for comments. NTIA, 2016. Available at: https://doi.org/www.ntia.doc.gov/files/ntia/publications/fr_meeting_vulnerability_disclosure_msp_04082016.pdf, Accessed December 2016.
    • (2016) NTIA vulnerability disclosure call for comments
  • 82
    • 0016264378 scopus 로고
    • Judgment under uncertainty: Heuristics and biases
    • Accessed April 2017
    • Tversky A, Kahneman D. Judgment under uncertainty: Heuristics and biases. Science. 1974; 185(4157):1124–1131. Available at: http://science.sciencemag.org/content/185/4157/1124, Accessed April 2017.
    • (1974) Science , vol.185 , Issue.4157 , pp. 1124-1131
    • Tversky, A.1    Kahneman, D.2
  • 83
    • 55349106566 scopus 로고    scopus 로고
    • Some limitations of “risk= threat× vulnerability× consequence” for risk analysis of terrorist attacks
    • Cox Jr LAT. Some limitations of “risk= threat× vulnerability× consequence” for risk analysis of terrorist attacks. Risk Analysis, 2008; 28(6):1749–1761.
    • (2008) Risk Analysis , vol.28 , Issue.6 , pp. 1749-1761
    • Cox, L.A.T.1
  • 84
    • 85048369122 scopus 로고    scopus 로고
    • Examining the costs and causes of cyber incidents
    • Romanosky S. Examining the costs and causes of cyber incidents. Journal of Cybersecurity, 2016; 2(2):121–135.
    • (2016) Journal of Cybersecurity , vol.2 , Issue.2 , pp. 121-135
    • Romanosky, S.1
  • 86
    • 79952055675 scopus 로고    scopus 로고
    • The impact of information security events on the stock value of firms: The effect of contingency factors
    • Yayla AA, Hu Q. The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology, 2011; 26(1): 60–77.
    • (2011) Journal of Information Technology , vol.26 , Issue.1 , pp. 60-77
    • Yayla, A.A.1    Hu, Q.2
  • 87
    • 69049088859 scopus 로고    scopus 로고
    • Empirical analysis of the effects of cyber security incidents
    • Accessed April 2017
    • Davis G, Garcia A, Zhang W. Empirical analysis of the effects of cyber security incidents. Risk Analysis, 2009; 29(9):1304–1316. Available at: https://doi.org/10.1111/j.1539-6924.2009.01245.x, Accessed April 2017.
    • (2009) Risk Analysis , vol.29 , Issue.9 , pp. 1304-1316
    • Davis, G.1    Garcia, A.2    Zhang, W.3
  • 88
    • 77950821955 scopus 로고    scopus 로고
    • Probabilistic risk analysis and terrorism risk
    • Accessed April 2017
    • Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic risk analysis and terrorism risk. Risk Analysis, 2010; 30(4):575–589. Available at: https://doi.org/10.1111/j.1539-6924.2010.01401.x, Accessed April 2017.
    • (2010) Risk Analysis , vol.30 , Issue.4 , pp. 575-589
    • Ezell, B.C.1    Bennett, S.P.2    Von Winterfeldt, D.3    Sokolowski, J.4    Collins, A.J.5
  • 89
    • 79951522406 scopus 로고    scopus 로고
    • How probabilistic risk assessment can mislead terrorism risk analysts
    • Accessed April 2017
    • Brown GG, Cox, LAT Jr. How probabilistic risk assessment can mislead terrorism risk analysts. Risk Analysis, 2011; 31(2):196–204. Available at: https://doi.org/10.1111/j.1539-6924.2010.01492.x, Accessed April 2017.
    • (2011) Risk Analysis , vol.31 , Issue.2 , pp. 196-204
    • Brown, G.G.1    Cox, L.A.T.2
  • 96
    • 0032645074 scopus 로고    scopus 로고
    • TCP/IP security threats and attack methods
    • Harris B, Hunt R. TCP/IP security threats and attack methods. Computer Communications, 1999; 22(10):885–897.
    • (1999) Computer Communications , vol.22 , Issue.10 , pp. 885-897
    • Harris, B.1    Hunt, R.2
  • 97
    • 72249089745 scopus 로고    scopus 로고
    • On the complex definition of risk: A systems-based approach
    • Haimes YY. On the complex definition of risk: A systems-based approach. Risk Analysis, 2009; 29(12):1647–1654.
    • (2009) Risk Analysis , vol.29 , Issue.12 , pp. 1647-1654
    • Haimes, Y.Y.1
  • 98
    • 84929626712 scopus 로고    scopus 로고
    • Loving the cyber bomb: The dangers of threat inflation in cybersecurity policy
    • Brito J, Watkins T. Loving the cyber bomb: The dangers of threat inflation in cybersecurity policy. Harvard National Security Journal, 2011; 3:39–84.
    • (2011) Harvard National Security Journal , vol.3 , pp. 39-84
    • Brito, J.1    Watkins, T.2
  • 99
    • 77957057726 scopus 로고    scopus 로고
    • Circuits of power: A study of mandated compliance to an information systems security “de jure” standard in a government organization
    • Smith S, Winchester D, Bunker D, Jamieson R. Circuits of power: A study of mandated compliance to an information systems security “de jure” standard in a government organization. MIS Quarterly, 2010; 34(3):463–486.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 463-486
    • Smith, S.1    Winchester, D.2    Bunker, D.3    Jamieson, R.4
  • 101
    • 78149400487 scopus 로고    scopus 로고
    • in Proceedings of the Fourth European Conference on Software Architecture. ECSA '10. ACM,, Accessed April 2017
    • Mellado D, Fernández-Medina E, Piattini M. A comparison of software design security metrics. Pp. 236–242 in Proceedings of the Fourth European Conference on Software Architecture. ECSA '10. ACM, 2010. Available at: https://doi.acm.org/10.1145/1842752.1842797, Accessed April 2017.
    • (2010) A comparison of software design security metrics , pp. 236-242
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 102
    • 84872103923 scopus 로고    scopus 로고
    • in Proceedings of the 28th Annual Computer Security Applications Conferenc
    • Anderson R. Security economics—A personal perspective. Pp. 139–144 in Proceedings of the 28th Annual Computer Security Applications Conference, 2012.
    • (2012) Security economics—A personal perspective , pp. 139-144
    • Anderson, R.1
  • 104
    • 10444243686 scopus 로고    scopus 로고
    • in Proceedings of the 10th ACM Conference on Computer and Communications Security. AC
    • Ning P, Xu D. Learning attack strategies from intrusion alerts. Pp. 200–209 in Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, 2003.
    • (2003) Learning attack strategies from intrusion alerts , pp. 200-209
    • Ning, P.1    Xu, D.2
  • 106
    • 84867720303 scopus 로고    scopus 로고
    • Man in the middle attacks demos
    • Ornaghi A, Valleri M. Man in the middle attacks demos. Blackhat, 2003; 19.
    • (2003) Blackhat , vol.19
    • Ornaghi, A.1    Valleri, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.