1 |
Security Market Erends "Social media and privacy protection security hardening", Ajou Economical, Nov. 2013.
|
2 |
Trifinite group [Internet]. Available: http://trifinite.org/.
|
3 |
Vivek Ramachandran, BackTrack 5 Wireless Penetration Testing, 1th ed. Uiwang, KR:Acorn, 2011.
|
4 |
J. S. Park, M. H. Park, and S. H. Jung, "A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device," Journal of the Korea information and communications society, vol. 38, no. 8, pp. 632-640, Aug. 2013.
과학기술학회마을
DOI
ScienceOn
|
5 |
Internet Policy Department of Legal Analysis Team, "Study on WLAN security legislation overseas," KISA: KR, Technical Report KISA-WP-2010-0003, 2010.
|
6 |
H. S. Seo, H. W. Kim, and W. Y. Ahn, "Monitoring system for packet analysis on Wi-Fi environment," Journal of the Korean society for computer information, vol. 16, no. 12, pp. 227-234, Dec. 2011.
과학기술학회마을
DOI
ScienceOn
|