참고문헌
- CCNX. http://www.ccnx.org/
- V. Jacobson et al., "Networking named content," CoNext'09, ACM, 2009.
- NDN. http://named-data.net/
- T. Koponen et al., "A Data-oriented (and beyond) Network Architecture," ACM SIGCOMM Computer Communi- cation Review, vol. 37, no. 4, Oct. 2007.
- Publish-Subscribe Internet Technology. http://www.fp7-pursuit.eu/PursuitWeb
- A. Afanasyev et al., "Interest flooding attack and countermeasures in named data networking," IEEE IFIP Networking Conference, 2013.
- A. Compagno et al., "Poseidon: Mitigating interest flooding ddos attacks in named data networking," The 38th IEEE Local Computer Networks (LCN), 2013.
- H. Dai et al., "Mitigate ddos attacks in ndn by interest traceback," IEEE Computer Communications Workshops (INFOCOM WKSHPS), 2013.
- P. Gasti et al., "Dos and ddos in named data networking," The 22nd IEEE ICCCN, 2013.
- C. Ghali et al., "Elements of trust in named-data networking," arXiv preprint arXiv:1402.3332, 2014.
- C. Ghali et al., "Needle in a haystack: Mitigating content poisoning in named-data networking," NDSS Workshop on Security of Emerging Networking Technologies(SENT), 2014.
- A. Karami and M. Guerrero-Zapata, "An anfis-based cache replacement method for mitigating cache pollution attacks in named data networking," Computer Networks, 2015.
- H. Park et al., "Detection of cache pollution attacks using randomness checks," IEEE ICC, 2012.
- S. Wang et al., "Collaborative caching based on hash-routing for information- centric networking," ACM SIGCOMM Computer Communication Review, 2013.
- X. Zhang et al., "Towards name-based trust and security for content-centric network," The 19th IEEE ICNP, 2011.
- G. Acs et al., "Cache privacy in named-data networking," The 3rd IEEE ICDCS, 2013.
- A. Chaabane et al., "Privacy in content-oriented networking: Threats and countermeasures," ACM SIGCOMM Computer Communication Review, 2013.
- S. DiBenedetto et al., "Andana: Anonymous named data networking application," arXiv preprint arXiv:1112.2205, 2011.
- T. Lauinger et al., "Privacy implications of ubiquitous caching in named data networking architectures," Technical report, TR-iSecLab-0812- 001, iSecLab, 2012.
- T. Lauinger et al., "Privacy risks in named data networking: what is the cost of performance?," ACM SIGCOMM Computer Communication Review, 2012.
- S. Chung et al., "A privacy-preserving approach in content centric networking," The 11th IEEE CCNC, 2014.
- S. Arianfar et al., "On preserving privacy in content-oriented networks," ACM SIGCOMM workshop on Information-centric networking, 2011.