효율적인 APT 대응 시스템 운영 모델
Vol. 27, No. 3, pp. 501-520,
6월.
2017
10.13089/JKIISC.2017.27.3.501, Full Text:
Keywords: APT, Sandboxing, Web Proxy, Cyber Kill Chain, Real-time Filtering
Abstract Statistics
Cite this article
10.13089/JKIISC.2017.27.3.501, Full Text:
Keywords: APT, Sandboxing, Web Proxy, Cyber Kill Chain, Real-time Filtering
Abstract Statistics
Cite this article
[IEEE Style]
E. Han and I. Kim, "Efficient Operation Model for Effective APT Defense," Journal of The Korea Institute of Information Security and Cryptology, vol. 27, no. 3, pp. 501-520, 2017. DOI: 10.13089/JKIISC.2017.27.3.501.
[ACM Style]
Eun-hye Han and In-seok Kim. 2017. Efficient Operation Model for Effective APT Defense. Journal of The Korea Institute of Information Security and Cryptology, 27, 3, (2017), 501-520. DOI: 10.13089/JKIISC.2017.27.3.501.