Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

빅데이터 기반 침해사고 및 정보보호 정책 정량 분석 방법론

Full metadata record
DC Field Value Language
dc.contributor.author정성훈-
dc.contributor.author김휘강-
dc.contributor.author우지영-
dc.date.accessioned2021-09-03T12:00:10Z-
dc.date.available2021-09-03T12:00:10Z-
dc.date.created2021-06-17-
dc.date.issued2017-
dc.identifier.issn1598-849X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/85240-
dc.description.abstractIn this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements.-
dc.languageKorean-
dc.language.isoko-
dc.publisher한국컴퓨터정보학회-
dc.title빅데이터 기반 침해사고 및 정보보호 정책 정량 분석 방법론-
dc.title.alternativeThe big data analysis framework of information security policy based on security incidents-
dc.typeArticle-
dc.contributor.affiliatedAuthor김휘강-
dc.identifier.doi10.9708/jksci.2017.22.10.073-
dc.identifier.bibliographicCitation한국컴퓨터정보학회논문지, v.22, no.10, pp.73 - 81-
dc.relation.isPartOf한국컴퓨터정보학회논문지-
dc.citation.title한국컴퓨터정보학회논문지-
dc.citation.volume22-
dc.citation.number10-
dc.citation.startPage73-
dc.citation.endPage81-
dc.type.rimsART-
dc.identifier.kciidART002277299-
dc.description.journalClass2-
dc.description.journalRegisteredClasskci-
dc.subject.keywordAuthorbig data-
dc.subject.keywordAuthorinformation security policy-
dc.subject.keywordAuthorinformation security incident-
dc.subject.keywordAuthortext analysis-
dc.subject.keywordAuthorpolicy evaluation-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE