1 |
Arun Raj Kumar, P. and S. selvakumar, "Distributed Denial of Service(DDoS) Threat in Collaborative Environment A Survey on DDoS Attack Tools and Traceback Mechanisms", IEEE International Advance Computing conference(IACC 2009), Mar, 2009.
|
2 |
Ki-Hun Jang, Heung-Yul Hyum, "The Intrusion Path and Threat Analysis of Smartphone", Korea Institute of Information Security Autumn Conf., pp 238 - 244, Oct, 2010.
|
3 |
Yong-Hui Jun, Jong-Soo Jang, Jin-Tae Oh, “DDoS Attack and Response Method”, Korea Institute of Information Security, Vol. 19, No. 3, pp 46 ~ 57, June, 2009.
|
4 |
Jae-Nam Woo, Bok-Ki Lee, Android Programming, 1st ed. Hanbit Media, Inc. 2012.
|
5 |
http://www.gartner.com/technology/home.jsp
|
6 |
Sang-Myung Choi, “Zombie Smartphone and DDoS Attack,” Hauri, Technical Report, 2012.
|
7 |
Ki-Hun Jang, "A Study on Smartphone DDoS Attack Detection and Response System via Source-End Based Packet Monitoring", M.S Degree. dissertation, Soonchunhyang Univ., 2012.
|
8 |
Ho-Kyu Maeng, Tae-Won Oh, “Model for Personal Information Protection from Smartphone Synchronization ”, Korea Computer Domestic Conference Vol 38, No.1(D). pp 44~47, 2011.
|
9 |
Ki-Hun Jang, Sang-Myung Choi, Heung-Yul Hyum, “The Attack Trend of Smartphone DDoS”, Journal of Korea Institute of Information Security Vol. 21, No. 5, pp 65 ~ 70, 2011.
|
10 |
National Information Society Agency, “Security Issue and Response Strategy of Smartphone and Mobile Office,” CIO Report, 2010.
|