02434nam a2200565 c 4500001001300000005001500013007000300028008004100031041001300072049002800085052001800113056001400131082001400145245041000159260006000569300003800629490004700667504002900714536009500743546002500838650004600863700004900909700005600958700002201014700002201036700002201058700002201080700002201102700002201124700002201146700002201168700002201190710005101212830007301263880010701336880006501443880002501508880002801533880002801561880002901589880002601618880002901644880002601673880002601699880002401725880002401749880002901773880005201802950001401854KMO20174157920171101092737ta170607s2016 ulkad 000 kor 0 akorbeng0 lEM6708901lEM6708902c201a004.61b17-28 a004.612601a005.8223006880-01a클라우드 가상화 환경에서 안정성 시험·이상행위 탐지 방안 연구 =xA study on anomaly dectection methods and security test in cloud virtualization environment /d수탁 기관: 아주대학교 산학협력단 ;e연구책임자: 곽진 ;e참여연구원: 김득훈,e최슬기,e김대현,e박수민,e최석준,e배원일,e박인규,e우시재,e이은지,e박병주 6880-02a서울 :bKISA(한국인터넷진흥원),c2016 a172 p. :b삽화, 도표 ;c26 cm10a최종연구보고서 ;vKISA-WP-2016-0039 a참고문헌: p. 168-171 a정보통신진흥기금으로 수행한 정보통신연구개발사업의 연구결과임 a영어 요약 있음 8a컴퓨터 보안[--保安]0KSH19980437541 6880-03a곽진g郭鎭,d1973-0KAC2017265801 6880-04a김득훈,g金得勛,d1989-0KAC2019G43441 6880-05a최슬기1 6880-06a김대현1 6880-07a박수민1 6880-08a최석준1 6880-09a배원일1 6880-10a박인규1 6880-11a우시재1 6880-12a이은지1 6880-13a박병주 6880-14a아주대학교.b산학협력단4aut 0a최종연구보고서(한국인터넷진흥원) ;vKISA-WP-2016-0039006245-01/(BaKeullaudeu gasanghwa hwangyeong eseo anjeongseong siheom·isang haengwi tamji bangan yeongu 6260-02/(BaSeoul :bKISA(Hanguk Inteonet Jinheungwon),c20161 6700-03/(BaGwak, Jin1 6700-04/(BaGim, Deukhun1 6700-05/(BaChoe, Seulgi1 6700-06/(BaGim, Daehyeon1 6700-07/(BaBak, Sumin1 6700-08/(BaChoe, Seokjun1 6700-09/(BaBae, Wonil1 6700-10/(BaBak, Ingyu1 6700-11/(BaU, Sijae1 6700-12/(BaI, Eunji1 6700-13/(BaBak, Byeongju 6710-14/(BaAju Daehakgyo.bSanhak Hyeomnyeokdan1 a비매품