참고문헌
- S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. doi:10.15207/jkcs.2017.8.2.021
- S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. doi:10.14400/jdpm.2014.12.1.423
- C. Gu, Y. Zheng, F. Kang & D. Xin. (2015). Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model. Cloud Computing and Big Data Lecture Notes in Computer Science, 335-343. doi:10.1007/978-3-319-28430-9_25
- K. Tammemae, A. Jantsch, A. Kuusik, J. Preden & E. Ounapuu. (2017). Self-Aware Fog Computing in Private and Secure Spheres. Fog Computing in the Internet of Things, 71-99. doi:10.1007/978-3-319-57639-8_5
- P. K. Rayani, B. Bhushan & V. R. Thakare. (2018). Multi-Layer Token Based Authentication Through Honey Password in Fog Computing. International Journal of Fog Computing, 1(1), 50-62. doi:10.4018/ijfc.2018010104
- V. Mushunuri, A. Kattepur, H. K. Rath, & A. Simha. (2017). Resource optimization in fog enabled IoT deployments. 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). doi:10.1109/fmec.2017.7946400
- Cloud and Fog Computing. (2017). Secure Connected Objects, 238-247. doi:10.1002/9781119426639.ch17
- R. Rios, R. Roman, J. A. Onieva & J. Lopez. (2017). From SMOG to Fog: A security perspective. 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). doi:10.1109/fmec.2017.7946408.
- S. Hong, S. Lim & J. Song. (2011). Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey. KSII Transactions on Internet and Information Systems, 805-821. doi:10.3837/tiis.2011.04.010
- S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. doi:10.14400/jdpm.2013.11.12.453
- Hong, S. (2015). Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques, 12(3), 137-143. doi:10.1007/s11416-015-0254-y
- S. Hong. (2017). Secure and light IoT protocol (SLIP) for anti-hacking. Journal of Computer Virology and Hacking Techniques, 13(4), 241-247. doi:10.1007/s11416-017-0295-5.
- K. Choi & J. A. Yoo. (2015). A reviews on the social network analysis using R. Journal of the Korea Convergence Society, 6(1), 77-83. doi:10.15207/jkcs.2015.6.1.077
- G. Ryu. (2015). Development of Educational Model for ICT-based Convergence Expert. Journal of the Korea Convergence Society, 6(6), 75-80. doi:10.15207/jkcs.2015.6.6.075.
- Y. Joh, Y. (2014). A Framework for IoT-Based Convergence Personalized Menu Recommendation System. Journal of the Korea Convergence Society ,5(4), 147-153. doi:10.15207/jkcs.2014.5.4.147.
- Fog Computing and compare with Cloud Computing. (2017). International Journal of Recent Trends in Engineering and Research, 3(12), 129-131. doi:10.23883/ijrter.2017.3546.pszaf
- B. Negash, A. M. Rahmani, P. Liljeberg & A. Jantsch. (2017). Fog Computing Fundamentals in the Internet-of-Things. Fog Computing in the Internet of Things, 3-13. doi:10.1007/978-3-319-57639-8_1