ICT 아웃소싱 환경에서 보안관리 방안 연구

The Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 23-31, 2월. 2014
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
Y. Kim, J. Mun, S. Hwang, H. Chang, "nan," The Korea Institute of Information Security and Cryptology, vol. 24, no. 1, pp. 23-31, 2014.

[ACM Style]
Yanghoon Kim, Je-Uk Mun, Seon-Ho Hwang, and Hangbae Chang. 2014. nan. The Korea Institute of Information Security and Cryptology, 24, 1, (2014), 23-31.