거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구
Vol. 25, No. 5, pp. 1281-1292,
10월.
2015
10.13089/JKIISC.2015.25.5.1281, Full Text:
Keywords: information security, Security risk analysis method, Quantitative risk analysis, Entropy rate-based risk analysis, risk model, CVE based risk analysis
Abstract Statistics
Cite this article
10.13089/JKIISC.2015.25.5.1281, Full Text:
Keywords: information security, Security risk analysis method, Quantitative risk analysis, Entropy rate-based risk analysis, risk model, CVE based risk analysis
Abstract Statistics
Cite this article
[IEEE Style]
K. Kim and Y. J. Won, "Which country's end devices are most sharing vulnerabilities in East Asia?," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 5, pp. 1281-1292, 2015. DOI: 10.13089/JKIISC.2015.25.5.1281.
[ACM Style]
Kwangwon Kim and Yoon Ji Won. 2015. Which country's end devices are most sharing vulnerabilities in East Asia?. Journal of The Korea Institute of Information Security and Cryptology, 25, 5, (2015), 1281-1292. DOI: 10.13089/JKIISC.2015.25.5.1281.