사례기반추론기법을 적용한 침해사고 프로파일링 시스템
Vol. 23, No. 6, pp. 1069-1086,
12월.
2013
10.13089/JKIISC.2013.23.6.1069, Full Text:
Keywords: Cyber Genome, Web Defacement, CBR, Profiling, Incident Response
Abstract Statistics
Cite this article
10.13089/JKIISC.2013.23.6.1069, Full Text:
Keywords: Cyber Genome, Web Defacement, CBR, Profiling, Incident Response
Abstract Statistics
Cite this article
[IEEE Style]
M. L. Han, D. J. Kim, H. K. Kim, "Applying CBR algorithm for cyber infringement profiling system," Journal of The Korea Institute of Information Security and Cryptology, vol. 23, no. 6, pp. 1069-1086, 2013. DOI: 10.13089/JKIISC.2013.23.6.1069.
[ACM Style]
Mee Lan Han, Deok Jin Kim, and Huy Kang Kim. 2013. Applying CBR algorithm for cyber infringement profiling system. Journal of The Korea Institute of Information Security and Cryptology, 23, 6, (2013), 1069-1086. DOI: 10.13089/JKIISC.2013.23.6.1069.