References
- 김영수, 문형진, 조혜선, 김병익, 이진해, 이진우, 이병엽, "계층적침해자원기반의 침해사고 구성 및 유형 분석," 한국콘텐츠학회논문지, 제16권, 제11호, pp.139-153, 2016. https://doi.org/10.5392/JKCA.2016.16.11.139
- 김영수, 이병엽, "클라우드 환경에서 문서의 유형분류를 위한 시맨틱 클러스터링 모델," 한국콘텐츠학회논문지, 제17권, 제11호, pp.389-397, 2017. https://doi.org/10.5392/JKCA.2017.17.11.389
- E. B. Lee, A Study on Information Security of Network Partition Based, Proc. of the KIISC Conference 20, Vol.1, pp.39-46, 2010.
- M. E. Kuhl, Cyber Attack Modeling and Simulation for Network Security Analysis, Simulation Conference 2007 (Winter), pp.1180-1188, 2007.
- J. S. Moon, Cyber Terrorism Trends and Countermeasures, Proc. of the KIISC Conference 20, Vol.4, pp.21-27, 2010.
- B. Lee and J. H. Lee, "Blockchain based secure firmware update for embedded devices in an Internet of Things environment," Journal of Supercomputing, Vol.73, No.3, pp.1152-1167, 2017. https://doi.org/10.1007/s11227-016-1870-0
- Satoshi Nakamoto, "Bitcoin:A peer-topeer electronic cash system," 2008.
- B. Lee, Y. J. Lim, and J. H. Lee, "Consensus algorithms in block-chain platforms," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp.386-387, 2017.
- H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel Distrib. Syst., Vol.22, No.11, pp.1912-1925, Nov. 2011. https://doi.org/10.1109/TPDS.2011.125
- D. Inoue, R. Nomura, and M. Kuroda, Transient MAC address scheme for untraceability and DOS attack resiliency on wireless network," in Proc. Wireless Telecommun. Symp., pp.15-23, Pomona, U.S.A., Apr. 2005.
- S. Banerjee, Order-P, An Algorithm To Order Network Partitionings, ICC '92, Conference record, SUPERCOMM, ICC '92, Discovering a New World of Communications, IEEE International Conference on 1, pp.432-436, 1992.
- Samuel T. King, SubVirt:Implementing Malware with Virtual Machines, Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006.
- C. Y. An and C. Yoo, Comparison of Vitualization Method, Proc. of the KIISE Korea Computer Congress 2008, Vol.35, No.1, pp.446-450, 2008.
- Guangda Lai, A Service Based Lightweight Desktop Virtualization System, Service Sciences (ICSS), 2010 International Conference on, pp.277-282, 2010,
- P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield, "Xen and the art of virtualization," Proc. of the 9th SOSP, pp.164-177, Oct. 2003.
- B. Liu, L. Lishen, and X. Qin, "Research on Hardware I/O Passthrough in Computer Virtualization," Proc. of ISCSCT 2010, pp.353-356, Aug. 2010.
- S. H. Kim, J. Y. Yang, and Y. J. Kim, "A Study on the Selfish Mining of Block Chain," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp.422-423, 2015.
- I. Eyal and Emin G. Sirer, "Majority is not Enough: Bitcoin Mining is Vulnerable," In Financial Cryptography, pp.436-454, 2014.
- A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf, and S. Capkun, "On the security and performance of proof of work blockchains," Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, ACM, pp.3-16, Oct. 2016.
- Muneeb Ali and Jude Nelson, Blockstack: A Global Naming and Storage System Secured by Blockchains, USENIX ATC, 2016.
- Vitalik Buterin, "A Next Generation Smart Contract & Decentralized Application Platform," Ethereum White Paper, 2014.