1 |
조성래.성행남.안병혁, "의사결정트리와 인공 신경망 기법을 이용한 침입탐지 효율성 비교 연구," 디지털산업정보학회논문지, 제11권, 제4호, 2015, pp. 33-45.
DOI
|
2 |
양환석, "프로토콜 기반 분산 침입탐지시스템 설계 및 구현," 디지털산업정보학회논문지, 제8권, 제1호, 2012, pp. 81-87.
|
3 |
Ostinato: http://ostinato.org/
|
4 |
Hping3: http://tools.kali.org/
|
5 |
M. Stula, "Fuzzy cognitive map for decision support in image post-processing," 18th International Conference on systems signal and image processing, Vol. 11, 2011, pp. 4-9.
|
6 |
B. Mukherjee, "Network intusion detection," IEEE Network, Vol. 8, No. 3, 1994, pp. 26-41.
DOI
|
7 |
S. Lee, Y. Kim, and B. Lee, "A Probe Detection Model using the Analysis of the Fuzzy Cognitive Maps," International Conference Cyber and Security, Vol. 3480, 2005, pp. 320-328.
|
8 |
J. Park, and M. Park, "A Whitelist-based Scheme for Detecting and Preventing Unauthorized AP Acess using Mobile Device," Journal of the Korea Information Communications Society, Vol. 10, No. 3, 2012, pp. 632-640.
|
9 |
W. Xiang, "Application of BP neural network with L-M algorithm in power transformer fault diagnosis," International Power system protection and control, Vol 10, No. 1, 2011, pp. 100-104.
|
10 |
S. Y. Lee, "An Adaptive Probe Detection Model using Fuzzy Cognitive Maps," Ph. D. Dissertation, Daejeon University, 2003.
|
11 |
Y. Brum, G. Serugendo, and M. Litoiu, "Engineering Self Adaptive Systems through Feedback Loops," In Software Engineering for Self Adaptive Systems, Springer-Verlag, 2009, 2013, pp. 48-70.
|
12 |
J. Moon, and Y. Chang, "A Malware Detection Application Framework Based on Normal Behavior," The Journal of the Convergence on Culure, Vol. 2, No. 1, 2016, pp. 79-85.
DOI
|