1. Construction of the sustainable cyber terror surveillance system;Lee;Hyundai Res. Inst.,2009
2. C.S. Shin, Study on the Analysis of the Evaluation of the Damage Caused by Cyber War, Hacking, and Malicious Codes, The Graduate School of National Defense Management, National Defense College, 2004.
3. J.W. Chae, Estimation Model for the Internet Incident Damages, 11th Information Protection Symposium SIS 2006-KISA, 2006.
4. Defending America’s cyberspace: national plan for information system protection, version 1.0, The White House, Washington, DC, 2000.
5. A survey of intrusion detection techniques;Lunt;Comput. Security,1993