1 |
A Raniwala, T Chiueh, "Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network," IEEE Computer and Communications Societies, Proceedings IEEE, 24th Annual Join, INFOCOM 2005.
|
2 |
Dea-Woo Park, Seung-Lin Im, "the hacker's attack, intrusion prevention system for the study of intelligent connection", Korea Institute of Computer and Information, Volume 11, No. 2, pp.351-360, May 2006.
|
3 |
Yeon-Seo Jung, Gul-Woo Ryu, Jong-Su Jang, "ESM technology trends for network security", ETRI, 2001.
|
4 |
Ashley Chonka, Jaipal Singh, Wanlei Zhou, "Chaos Theory Based Detection against Network Mimicking DDoS Attacks", IEEE Communications Letters, Vol. 13 No. 9, pp. 717-719, September 2009.
DOI
ScienceOn
|
5 |
K. K. Mookhey, "Nilesh Burghate, Detection of SQL Injection and Cross-site Scripting Attacks", http://www.securityfocus.com/infocus/1768
|
6 |
Dea-Woo Park, "A Study on Hacking Attacks and Real-time Security Cooperation System of WiBro Service", Korea Institute of Maritime Information and Communication Sciences, Vol. 4 No. 1, pp. 6-9, June 2011.
|
7 |
Dea-Woo Park, Jung-Man Seo, "TCP/IP attacks, security measures for the study," Korea Institute of Computer and Information, Volume 10 No. 5, pp.217-226, November 2005.
|
8 |
In-Hee Lee, Dea-Woo Park, "spam and Vulnerability attack to VoIP and security for the Study", Korea Computer and Information Science, Volume 14 No. 2, pp.215-224, December 2006.
|
9 |
Sung-Ho Ahn, Chang-Gu Kang, Young-Rak Choi, "Agent DDoS attack response mechanisms and through cooperation,"
|
10 |
"Reducing the Energy Consumption of Ether net with Adaptive Link Rate(ALR)", Cham ara Gunaratne, IEEE Transaction on computers, Vol. 57, No. 4, 2008.
|
11 |
Jung-Ho Choi, "cyber-terrorism, and South Korea support the direction of the transition", Defence and Security Conference, pp.155-172, April 2008.
|
12 |
T Yamakami, T ACCESS, "MobileWeb 2.0: Lessons from Web 2.0 and Past Mobile Internet Development," Multimedia and Ubiquitous Engineering, 2007.
|