1 |
Arun Raj Kumar, P. and S. Selvakumar, "Distributed Denial-of-Service Threat in Collaborative Environment A Survey on DDoS Attack Tools and Traceback Mechanisms", IEEE International Advance Computing Conference 2009
|
2 |
C-J Ryu, K-H Han, "A Study on the Security Research about Botnet Attack Detection Interception" KICS, 2010.
|
3 |
K-H Jang, S-M Choi, H-Y Yeom "Smartphone DDoS Attack Trends", KIISC, 2011
|
4 |
S-W Lee, "DDoS Attack Change and Forward", Financial Security Agency Issue Report Vol.2011-004, 2011.
|
5 |
G-Y Kim, S-J Cho, "Security Vulnerability Trends in Smartphones", KIISE Fall Conference, Vol.37, No.2 pp.90-91, 2010.
|
6 |
W-S Choi, S-J Han "A Study of DDOS Attack and Malicious code Countermeasures for Smart Phone", KIPS C2012J 0153, Fall Conference 2012.
|
7 |
Bud Smith, "How to do Everthing Nexus One", 2010.
|
8 |
Ken Dunham, "Mobile Malware attacks and Defense", SYNGRESS, 2009.
|
9 |
G Carl, G Kesidis, RR Brooks, S Rai, "Denial of serviceattack detection techniques", IEEE Internet Computing, pp.82-89, 2006.
|
10 |
Felix Lau, stuart H. Rubin, Michael H. Smith, Ljiljana Trajkovic, "Distributed Denial of Service Attacks", 2000 IEEE International Conference on Systems, Man and Cybernetics, Volume, pp.2275-2280, 2000.
|