1 |
M. S. Smith, "Protecting Privacy in an IoT-Connected World," Information Management Journal, vol. 49, Issue 6, pp. 36-39, Nov./Dec. 2015.
|
2 |
R. H. Weber, "Internet of things: Privacy issues revisited," Computer Law & Security Review, Vol. 31, Issue 5, pp. 618 -627, Oct. 2015.
DOI
|
3 |
Windows 10 IoT Core [Internet]. Available : https://developer.microsoft.com/ko-kr/windows/iot.
|
4 |
The penetration testing standard [Internet]. Available : http://www.pentest-standard.org/index.php/PTES_Technical _Guidelines.
|
5 |
ARM architecture penetration information [Internet]. Available : https://www.defcon.org/html/links/dc-archives/dc-18-archive.html.
|
6 |
Microsoft Windows platform [Internet]. Available : https://docs.microsoft.com/ko-kr/windows/uwp/get-started/ universal-application-platform-guide.
|
7 |
Microsoft Windsock code [Internet]. Available : https://msdn.microsoft.com/ko-kr/library/windows/desktop/ ms737593(v=vs.85).aspx.
|
8 |
Analyzes malicious contents by online antivirus engines [Internet]. Available : https://www.virustotal.com/.
|