1 |
Quttoum, A.N, Otrok, H, and Dziong, Z, "A collusion-resistant mechanism for autonomic resource management in Virtual Private Networks," Computer communications, vol.33, no.17, pp.2070- 2078, Nov. 2010.
DOI
ScienceOn
|
2 |
Hubballi N, Roopa S, and Ratti R, "An Active Intrusion Detection System for LAN Specific Attacks," Lecture notes in computer science, vol.6059, pp.129-142, June 2010.
|
3 |
천준호, 장근원, 전문석, 신동규, "DDoS 공격에 대한 방화벽 로그 기록 취약점 분석," 한국정보보호학회논문지, 17(6), pp.143-148, 2007년 12월.
|
4 |
김정덕, 김건우, 이용덕, "융합보안의 개념 정립과 접근방법," 정보보호학회지, 19(6), pp.68-74, 2009년 12월.
|
5 |
Erete I, "Browser-Based Intrusion Prevention System," Recent advances in intrusion detection: 12th international symposium, Lecture notes in computer science, vol.5758, pp.371-373, 2009.
|
6 |
박순태, 이완석, 노봉남, "주요정보통신기반시설 보호를 위한 취약점 분석.평가 관리 방안," 정보보호학회지, 19(6), pp.32-40, 2009년 12월.
|
7 |
Qiu X and Paterson R, "An Innovative Network Security Vulnerability Modeling Method and Tool," IEEE communications magazine, vol.48, no.1, pp.104-108, Jan. 2010.
|
8 |
Yuan H, "A Network Security Risk Assessment Method Based on Immunity Algorithm," Trans-Tech Publications, pp.948-953, May. 2010.
|
9 |
Zeeshan A, Imine A, and Rusinowitch M, "Safe and Efficient Strategies for Updating Firewall Policies," Lecture notes in computer science, vol.6264, pp.45-57, Aug. 2010.
|
10 |
Gouda, M.G and Liu, A.X, "Structured firewall design," Computer networks, vol.51, no.4, pp.1106-1120, Mar. 2007.
DOI
ScienceOn
|