References
- M. Weiser, 'Some Computer Science Problems in Ubiquitous Computing,' Communications of the ACM, Vol.36, pp.75 - 84, 1993 https://doi.org/10.1145/159544.159617
- M. Satyanarayanan. 'Pervasive Computing: Visioin and Challenges,' IEEE Personal Communications, Aug, 2001 https://doi.org/10.1109/98.943998
- Al. Mankin, et al., 'On Design and Evaluation of Intention-Driven ICMP Traceback,' Proceedings of the IEEE International Conference on Computer Communication and Networks, pp.159-165. Oct., 2001 https://doi.org/10.1109/ICCCN.2001.956234
- D. Schnackengerg and K. Djahandari, 'Cooperative Intrusion Traceback and Response Architecture,' Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), pp.56-68, June, 200l https://doi.org/10.1109/DISCEX.2001.932192
- J. Cabreraa, et al., 'Proactive Detection of Distributed Denial of Service Attacks using MIB Traffic Variables-A Feasibility Study,' The 7th IFIP/lEEE International Symposium on Integrated Network Management, pp.609-622, May, 2001 https://doi.org/10.1109/INM.2001.918069
- D. Kashiwa, E. Chen, and H. Fuji, 'Active Shaping: a Countermeasure against DDoS attacks,' Proceedings of the 2nd IEEE European Conference on Universal Multiservice Networks, pp.171- 179, Apr., 2002 https://doi.org/10.1109/ECUMN.2002.1002103
- K. Wan and R. Chang, 'Engineering of a Global Infrastructure for DDoS attacks,' Proceedings of the 10th IEEE International Conference on Networks, pp.419-427, Aug., 2002 https://doi.org/10.1109/ICON.2002.1033348
- V. Paxson, 'An Analysis of Using Reflectors in Distributed Denial-of-Service Attacks,' ACM SIGCOMM Computer Communication Review, Vol.31, No.3, pp.38-47, 2001 https://doi.org/10.1145/505659.505664
- F. Wang, R. Uppalli, and C. Killian, 'Analysis of Techniques for Building Intrusion Tolerant Server Systems,' Proceedings of Military Communications Conference, pp.729-734, Oct., 2003 https://doi.org/10.1109/MILCOM.2003.1290202
- A. Avizienis, J. Laprie, and B. Randell, 'Fundamental Concepts of Dependability,' Proceedings of the 3rd Information Survivability Workshop, pp.7-12, Oct., 2000
- J. Reynolds, et al., 'On-line Intrusion Detection Attack Prevention Using Diversity Generate-and-Test, and Generalization,' Proceedings of the 36th Annual Hawaii International Conferences on System Sciences, pp.335-342, Jan., 2003 https://doi.org/10.1109/HICSS.2003.1174911
- J. Knight, et al., 'The Willow Architecture: Comprehensive Survivability for Large-Scale Distributed Applications,' Technical Report CU-CS-926-01, Department of Computer Science, University of Colorado, 2001
- V. Westmark, 'A Definition for Information System Survivability,' Proceedings of the 37th Annual Hawaii International Conferences on System Sciences, Jan., 2004 https://doi.org/10.1109/HICSS.2004.1265710
- B. Madan, et al., 'Modeling and Quantification of Security Attributes of Software Systems,' Proceedings of the International Conference on Dependable Systems and Networks, pp.505-514, June, 2002 https://doi.org/10.1109/DSN.2002.1028941
- F. Cohen, 'Simulating Cyber Attacks, Defenses, and Consequences,' Fred Cohen & Associates, 1999
- M. Gupta, A. Chaturvedi, and S. Mehta, 'The Experimental Analysis of Information Security Management Issues for Online Financial Services,' Proceedings of the 21st ACM International Conference on Information Systems, pp.667-675, 2000
- B. Littlewood, et al., 'Towards Operational Measures of Computer Security,' Journal of Computer Security, pp. 211-229, 1993
- R. Ortalo, et al., 'Experiments with Quantitative Evaluation Tools for Monitoring Operational Security,' IEEE Transaction on Software Engineering, Vol.25, pp.633-650, 1999 https://doi.org/10.1109/32.815323
- C. Choi, S. Kim, and W. Choi, 'Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems,' Lecture Notes in Computer Science, Springer, Vol.3043, No.1, pp.207-214, May, 2004 https://doi.org/10.1007/b98048
- 최창열, 김성수, '유비쿼터스 컴퓨팅의 신뢰성 모델링을 위한 정량적 분석법', 2004년 한국정보과학회 춘계학술발표대회, 한국정보과학회, 제31권 1호,pp.622-624, 2004
- R. Rivest, 'The MD5 Message-Digest Algorithm,' RFC 1321, Internet Engineering Task Force, 1992
- J. Mirkovic, G. Prier, and P. Reiher, 'Attacking DDoS at the Source,' Proceedings of the 10th IEEE Inter- national Conference on Network Protocols, pp.312-321, 2002
- S. Hunter and W. Smith, 'Code-Red: a Case Study on the Spread and Victims of an Internet Worm,' Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, Analysis and Synthesis, pp.273-284, 2002 https://doi.org/10.1145/637201.637244