1. European Union Agency for Network and Information Security (ENISA): ENISA Threat Landscape 2020—List of Top 15 Threats (2020)
2. Jin, H.H., Kim, H.K.: A study on web vulnerability risk assessment model based on attack results: focused on cyber kill chain. J. Korea Inst. Inf. Secur. Cyptol. 31(4) (2021)
3. OWASP. https://owasp.org/www-project-top-ten (2022)
4. OWASP: OWASP Top 10-2017 (2017)
5. Sung, J., Seok-Min, K., Lee, Y., Taeck-Geun, K., Kim, B.: High-speed pattern matching algorithm using TCAM. J. Korea Inf. Process. Soc. 12(4) (2005)