Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)
Vol. 24, No. 5, pp. 961-968,
Oct.
2014
10.13089/JKIISC.2014.24.5.961, Full Text:
Keywords: Personal Information, PC security solution, log analysis
Abstract Statistics
Cite this article
10.13089/JKIISC.2014.24.5.961, Full Text:
Keywords: Personal Information, PC security solution, log analysis
Abstract Statistics
Cite this article
[IEEE Style]
H. T. Chae and S. Lee, "Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information)," Journal of The Korea Institute of Information Security and Cryptology, vol. 24, no. 5, pp. 961-968, 2014. DOI: 10.13089/JKIISC.2014.24.5.961.
[ACM Style]
Hyun Tak Chae and Sang-Jin Lee. 2014. Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information). Journal of The Korea Institute of Information Security and Cryptology, 24, 5, (2014), 961-968. DOI: 10.13089/JKIISC.2014.24.5.961.