References
- Ashley Chonka, Jaipal Singh, Wanlei Zhou, "Chaos Theory Based Detection against Network Mimicking DDoS Attacks", IEEE Communications Letters, Vol. 13 No. 9, pp. 717-719, September 2009. https://doi.org/10.1109/LCOMM.2009.090615
- K. K. Mookhey, "Nilesh Burghate, Detection of SQL Injection and Cross-site Scripting Attacks", http://www.securityfocus.com/infocus/1768
- Dea-Woo Park, "A Study on Hacking Attacks and Real-time Security Cooperation System of WiBro Service", Korea Institute of Maritime Information and Communication Sciences, Vol. 4 No. 1, pp. 6-9, June 2011.
- Dea-Woo Park, Jung-Man Seo, "TCP/IP attacks, security measures for the study," Korea Institute of Computer and Information, Volume 10 No. 5, pp.217-226, November 2005.
- Sung-Ho Ahn, Chang-Gu Kang, Young-Rak Choi, "Agent DDoS attack response mechanisms and through cooperation,"
- "Reducing the Energy Consumption of Ether net with Adaptive Link Rate(ALR)", Cham ara Gunaratne, IEEE Transaction on computers, Vol. 57, No. 4, 2008.
- In-Hee Lee, Dea-Woo Park, "spam and Vulnerability attack to VoIP and security for the Study", Korea Computer and Information Science, Volume 14 No. 2, pp.215-224, December 2006.
- Jung-Ho Choi, "cyber-terrorism, and South Korea support the direction of the transition", Defence and Security Conference, pp.155-172, April 2008.
- T Yamakami, T ACCESS, "MobileWeb 2.0: Lessons from Web 2.0 and Past Mobile Internet Development," Multimedia and Ubiquitous Engineering, 2007.
- A Raniwala, T Chiueh, "Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network," IEEE Computer and Communications Societies, Proceedings IEEE, 24th Annual Join, INFOCOM 2005.
- Dea-Woo Park, Seung-Lin Im, "the hacker's attack, intrusion prevention system for the study of intelligent connection", Korea Institute of Computer and Information, Volume 11, No. 2, pp.351-360, May 2006.
- Yeon-Seo Jung, Gul-Woo Ryu, Jong-Su Jang, "ESM technology trends for network security", ETRI, 2001.