References
- J. Mirkovic and P. Reiher, "A taxonomy of DDoS attack and DDoS defence mechanisms," Association for Computing Machinery's Special Interest Group in communication and computer networks, Computer Communication Review, vol. 34, no. 2, Apr. 2004, pp. 39-53.
- M. M. Specht and R. B. Lee, "Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures," Proc. of the 17th Int. Conf. on Parallel and Distributed Computing Systems, 2004 Int. Workshop on Security in Parallel and Distributed Systems, Sep. 2004, pp. 543-550.
- C. V. Secau, "Developing VoIP Honeypots: a Preliminary Investigation into Malfeasant Activity," J. of Digital Forensics, Security and Law, vol. 5, no. 2, 2010, pp. 35-43.
- R. Carmo, M. Nassar, and O. Festor, "Artemisa: an Open-Source Honeypot Back-End to Support Security in VoIP Domains," 12th Int. Federation for Information Processing/IEEE Int. Symp. on Integrated Network Management 2011, May 2011, pp. 361-368.
- S. Brown, R. Lam, S. Prasad, S. Ramasubramanian, and J. Slauson, "Honypots in Cloud," M.S. thesis, University of Wisconsin-Madison, Dec. 2012, http://pages.cs.wisc.edu/-sbrown/downloads/honeypots-in-the-cloud.
- R. Ramya, "Securing the system using honeypot in cloud computing environment," International J. of Multidisciplinary Research and Development, vol. 2, no. 4, Apr. 2015, pp. 172-176.
- F. Araujo, K. W. Halen, S. Biederman, and S. Katzenbeisser, "From Patches to Honey-Patche: Lightweight Attacker Misdirection, Deceptiom, and Disinformation," Proc. of CCS '14 Proc. of the 2014 ACM SIGSAC Conf. on Computer and Communications Security, Nov. 2014, pp. 942-953.
- T. K. Lengyel, J. Neumann, S. Maresca, and A. Kiayias, "Towards Hybrid Honeynets vis Virtual Machine Introspection and Cloning," Network and System Security 2013, June 2013, pp. 1-14.
- S. Kim, S. Goh, C. Jung, and S. Lee, "Energy-efficient and QoS Guaranteed MAC protocol in Ubiquitous Sensor Networks," J. of the Korea Institute of Electronic Communication Sciences, vol. 3, no. 2, June 2008, pp. 71-78.
- M. Son, and Y. Kim, "A Study on Hierarchical Communication Method for Energy Efficiency in Sensor Network Environment," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 8, Aug. 2014, pp. 889-898. https://doi.org/10.13067/JKIECS.2014.9.8.889
- W. Jung and Y. Oh, "A Study on Energy Efficient MAC Protocol based on S-MAC Protocol," The J. of Korean Institute of Communications and Information Sciences, vol. 35, no. 2, Feb. 2010, pp. 43-49.