IaaS 서비스의 정보보호 기술 분석 및 기업의 특성을 고려한 기술 적용방법 연구

The Korea Institute of Information Security and Cryptology, Vol. 22, No. 8, pp. 61-73, Dec. 2012
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. H. Kang, J. Y. Kim, C. S. Park, H. J. Kim, "nan," The Korea Institute of Information Security and Cryptology, vol. 22, no. 8, pp. 61-73, 2012.

[ACM Style]
Jin Hee Kang, Ji Yeon Kim, Choon Sik Park, and Hyung Jong Kim. 2012. nan. The Korea Institute of Information Security and Cryptology, 22, 8, (2012), 61-73.