共 53 条
- [31] LEE CHANG-MOO, 2017, [Korean Security Journal, 시큐리티연구], V50, P285, DOI 10.36623/kssa.2017.50.11
- [32] 황현동, 2016, [Korean Security Journal, 시큐리티연구], V47, P119
- [33] Lee Hyojik, 2016, [The Journal of Society for e-Business Studies, 한국전자거래학회지], V21, P121, DOI 10.7838/jsebs.2016.21.2.121
- [34] Lee J.B., 2014, WORLD CONST LAW REV, V14, P89
- [36] LEE SOONOK, 2019, [CHUNG_ANG LAW REVIEW, 중앙법학], V21, P39, DOI 10.21759/caulaw.2019.21.1.39
- [37] Li YJ, 2008, J MATER SCI TECHNOL, V24, P410
- [39] A Cost-Optimization Scheme Using Security Vulnerability Measurement for Efficient Security Enhancement [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2020, 16 (01): : 61 - 82