1 |
M. Thottan and C. Ji, "Anomaly Detection in IP Networks," IEEE Transactions on Signal Processing, vol. 51, no. 8, pp.2191-2204. 2003. 05. DOI: https://doi.org/10.3745/KTCCS.2020.9.5.113
DOI
|
2 |
H. H. Lim, D. H. Kim, K. T. Kim and H. Y. Youn, "Traffic classification using machine learning in SDN," Winter Conference of the Korean Society of Computer and Information Technology, Vol. 26, No. 1, 2018. 01.
|
3 |
Vijayan, Jaikumar, McCann and Stefanie, "NUMA," Computerworld, Vol. 32, No. 23, 1998. 06.
|
4 |
Schlegl Thomas, Philipp Seebock, Sebastian M. Waldstein, Ursula Schmidt-Erfurth and Georg Langs, "Unsupervised anomaly detection with generative adversarial networks to guide marker discovery," International Conference on Information Processing in Medical Imaging. Springer, Cham, 2017. 03.
|
5 |
K. H. Jung, B. H. Lee and D. Yang, "Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads" Journal of the Korea Institute of Information and Communication Engineering, Vol. 22, No. 5, pp. 794-840, 2018. 02. DOI: https://doi.org/10.6109/jkiice.2018.22.4.794
DOI
|
6 |
S. Ahn, D. Kang and Y. Eom, "Analysis on the Characteristics and Performance Effects of Linux Huge Page," Journal of the Korean Society of Information Sciences, Vol. 2017, No. 06, pp. 73-75, 2017. 06.
|
7 |
H. J. Kim, H. S. Kim, D. M. Shin, "Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines," Journal of Software Assessmnet and Valuation, Vol. 15, No. 1, pp. 1-9, 2019. 06. DOI: https://10.29056/jsav.2019.06.01
DOI
|
8 |
J. K. Lee, S. J. Kim and T. Hong, "Analysis of Traffic and Attack Frequency in the NURION Supercomputing Service Network," KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 5, pp.113-120, 2020. 01. DOI: https://doi.org/10.3745/KTCCS.2020.9.5.113
DOI
|
9 |
Cisco, "Cisco Visual Networking Index: Forecast and Trends, 2017-2022," 2018. 11
|
10 |
D. I. Oh, "In the post-corona era, cyber attacks will intensify," Electronic Newspaper, 2020. 05, https://www.etnews.com/20200512000181
|
11 |
S. H. Lee, J. C. Na and S. W. Son, "Traffic Analysis Technology Trends in Terms of Security," https://www.itfind.or.kr/WZIN/jugidong/1117/111701.htm
|
12 |
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio, "Generative adversarial nets. In Advances in Neural Information Processing Systems," NIPS'14: Proceedings of the 27th International Conference on Neural Information Processing Systems, Vol. 2, pp. 2672-2680, 2014. 03.
|
13 |
S. Kim and S. Lee, "Automatic Malware Detection Rule Generation and Verification System", Journal of Internet Computing and Services(JICS), Vol. 20, No. 2, pp. 9-19, 2019. 09. DOI: https://doi.org/10.7472/jksii.2019.20.2.9
DOI
|