References
- 한국정보보호산업협회, '최신 정보보호 제품 및 기술 동향', http://www.kisia.or.kr/
- 인터넷침해사고대응지원센터, http://www.certcc.or.kr/
- 한국정보보호진흥원, http://www.kisa.or.kr/
- 한국정보처리학회, Active Network 과 Security 기술 기반, Vol.1 No.1, 2000
- OPSEC, http://www.opsec.com
- Active Security, http://www.nai.com/
- 한국전자통신연구원, '능동 보안을 위한 이동형 에이전트 알고리즘 및 에이전트 네트워킹 구조 연구에 관한 연구' 최종보고서, 2002
- 신원, '안전한 이동 에이전트 시스템의 설계와 응용', 박사학위 논문, 2001
- C. A. Carver Jr., J. M.D. Hill, J. R. Surdu, and U. W. Pooch, 'A Methodology for Using Intelligent Agents to provide Automated Intrusion Response', Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, 2000
- Java Technology ,http://java.sun.com/
- TCPDUMP public repository, http://www.tcpdump.org/
- S. Fenet, S. Hassas, 'A Distributed Intrusion Detection and Response System Based on Mobile Autonomous Agents Using Social Insects Communication Paradigm ,' First International Workshop on Security of Mobile Multiagent Systems, Autonomous Agents Conference, 2001
- A. Dadon-Elichai, 'RDS: Remote Distributed Scheme for Protecting Mobile Agents', AAMAS'04, 2004
- A. T. Campbell et al, 'A Survey of Programmable Networks', Computer Communication Review, Vol.29 No.2, pp.7-23, 1999 https://doi.org/10.1145/505733.505735
- K. Psounis, 'Active Networks: Applications, Security, Safety, and Architectures', IEEE Communications Surveys, First Quarter 1999
- D. Denning, 'Information Warfare and Security', Addison-Wesley ,1999
- W. Jansen and T. Karygiannis, 'NIST Special Publication 800-19:Mobile Agent Security,' National Institute of Standards and Technology, 1999
- C. M. King, C. E. Dalton and T. T. Osmanoglu, 'Security Architecture: Design, Deployment and Operations', McCraw-Hill, 2001
- D. J. Marchette, 'Computer Intrusion Detection and Network Monitoring', Springer-Verlag, 2001
- A. Menezes, P. van Oorschot and S. Vanstone, 'Hadnbook of Applied Cryptography', CRC Press, Boca Raton, FL, 1996
- P. E. Proctor, 'Parctical Intrusion Detection Handbook', Prentice Hall PTR, 2001
- B. Schneier, 'Applied Cryptography', 2nd, John Wiley & Sons,1996
- W. Stallings, 'Data & Computer Communications 6th Edition', Prentice Hall, 2000