1 |
H.C. Kwon, "Technologies for Next Generation Wireless LAN Security", 2015 Annual Security Users' Festival, 2015.11. (in Korean)
|
2 |
M.S. Gu, Y.Z. Li, "A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code," Journal of IT Convergence Society for SMB, Vol. 5, No. 4, pp. 37-42, 2015.
|
3 |
S.H. Hong, Y.J. Seo, "Countermeasure of Sniffing Attack: Survey," Journal of IT Convergence Society for SMB, Vol. 6, No. 2, pp. 31-36, 2016.
|
4 |
M.Y. Shin, S.H. Hong, "A Defending Method Against DDoS Attacks With Router Control," Journal of IT Convergence Society for SMB, Vol. 5, No. 1, pp. 21-26, 2015
|
5 |
KISA, "A handbook for wireless LAN security", Korea Communications Commission, Korea Information Security Agency, 2010.01. (in Korean)
|
6 |
J.H. Na, K.S. Kim, D.S. Kwon, H.K. Chung, "Technical Trends of Small Cell Base Stations for LTE", Electronics and Telecommunications Trends, Vol.30, No.1, pp.102-113, 2015.02.
|
7 |
NMC Consulting Group, "LTE Security I: LTE Security Concept and LTE Authentication", Netmanias Technical Document, 2013.07.
|
8 |
NMC Consulting Group, "EMM Procedure 1. Initial Attach - Part 2. Call Flow of Initial Attach", Netmanias Technical Document, 2014.01.
|
9 |
C.M. Yoo, "Understanding the Basic Operations of DHCP", NETMANIAS TECH-BLOG, 2011.12
|
10 |
R. Droms, Dynamic Host Configuration Protocol, RFC 2131, IETF, 1997.03.
|
11 |
J.T. Kim, M.H. Han, J.H. Lee, J.H. Kim, I.K. Kim, "Technical Trends of the Cyber Attack Traceback", Electronics and Telecommunications Trends, Vol.29, No.1, pp.93-103, 2014.02.
|
12 |
J.H. Oh, K.H. Lee, "Attack Scenarios and Countermeasures using CoAP in IoT Environment", Journal of the Korea Convergence Society, Vol. 7. No. 4, pp. 33-37, 2016.
DOI
|
13 |
C.R. Seo, K.H. Lee, "ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment", Journal of the Korea Convergence Society, Vol. 7. No. 4, pp. 39-44, 2016.
DOI
|
14 |
S.W. Cho, W.J. Jang, H.W. Lee, "mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone", Journal of the Korea Convergence Society, Vol. 3, No. 3, pp. 7-12, 2012.
|
15 |
J.T. Kim, I.K. Kim, K.H. Kang, "Technical Trends of the Cyber Targeted Attack Traceback-Connection Chain & Traceback", Electronics and Telecommunications Trends, Vol. 30, No. 4, pp. 120-128, 2015.08.
|
16 |
D.H. Lee, D.G. Yeo, J.h. Jang, H.Y. Youm, "Traceback technology trends at Ad-hoc network", Review of KIISC, Vol.20, No.4. pp.85-94, 2010.08.
|
17 |
J.S. Lim, "Design of Fusion Multilabeling System Controlled by Wi-Fi Signals", Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 1-5, 2015.
DOI
|
18 |
H.W. Lee, "TTL based Advanced Packet Marking Mechanism for Wireless Traffic Classification and IP Traceback on IEEE 802.1x Access Point", Journal of the Korea Contents Association, Vol.7. No.1. pp. 103-115, 2007.01
DOI
|
19 |
H.G. Cho, "Trend and prospect of wireless LAN standards", TTA Journal, Vol.147, pp. 39-42, 2013.05. (in Korean)
|