1 |
L. Rokach and O. Maimon, "Top-down induction of decision trees classifier - a survey," IEEE Trans. on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 35, no. 4, Nov. 2005, pp. 476-487.
DOI
ScienceOn
|
2 |
정혜원, "MANET에서 규칙을 기반으로 한 계층형 침입탐지에 관한 연구," 디지털산업정보학회지, 제6권, 제4호, 2010, pp. 153-160.
|
3 |
T. Sander and C. F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts," G. Vigna, editor, Mobile Agents and Security, vol. 1419, LNCS, 1998, pp. 44-60.
|
4 |
서희석, 김상호, 이승재, "소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계," 디지털산업정보학회지, 제6권, 제3호, 2010, pp. 121-129.
|
5 |
S. Yi, R. Kravets, "MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks," 2nd Annual PKI Research Workshop Program(PKI 03), 2003, pp. 65-79.
|
6 |
S. Garfinke, "PGP:Pretty Good Privacy," O'Reilly & Associates Inc., USA, 1995.
|
7 |
S. Capkun, L. Buttyan, J. Hubaux, "Self-Orgranized Public-Key Management form Mobile Ad Hoc Networks," IEEE Trans on Mobile Computing, Vol. 2, No. 1, 2003, pp. 52-64.
DOI
ScienceOn
|
8 |
S. Basagni, M. Conti, S. Giodano, I. Stojmenovic, "Mobile Ad Hoc Networking," IEEE press, Wiley-Interscience, 2004.
|
9 |
V. Karpijoki, "Security in Ad Hoc Networks," Helsinki University of Technology, Tik-110. 501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory, 2000.
|