1 |
John Brozycki, Eric Cole, "Detecting and Prevventing Anonymous Proxy Usage," SANS Institute InfoSec Reading Room, Sep 2008.
|
2 |
Example of Analysis about principal of Tor network and related malware, Korea Internet & Security Agency, May 2014.
|
3 |
Nicholas Hopper, Eugene Y. Vasserman, and Eric Chan-Tin, "How Much Anonymity does Network Latency Leak?," ACM Transactions on Information and System Security, Vol. 13, Feb. 2010.
|
4 |
Stevens Le Blond, David Choffnes, Wenxuan Zhou, Peter Druschel, Hitesh Ballani and Paul Francis, "Towards Efficient Traffic-analysis Resistant Anonymity Networks," ACM SIGCOMM '13, pp. 303-314, 2013.
|
5 |
Norman Danner, Danny Krizanc, and Marc Liberatore, "Detecting Denial of Service Attacks in Tor," Financial Cryptography and Data security LNCS 5628, pp. 273-284, 2009.
|
6 |
Jun-Ki Lee, Kwang-Sun Park, "Countermeasure against Cyber Crime using VPN," Journal of Korean Digital Forensics Society, Dec 2013.
|
7 |
Dingledine, R., Mathewson, N., Syverson, P., "The Second-generation onion router," Proceedings of the 13th USENIX Security Symposium, pp. 303-320, 2004.
|
8 |
Sambuddho Chakravarty, Angelos Stavrou, and Angelos D. Keromytis, "Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwith Estimation," ESORICS 2010 LNCS 6345, pp. 249-267, 2010.
|
9 |
Young-Jin Kim, Su-Yeon Lee, Hun-Yeong Kwon, and Jong-In Lim, "A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services," Korea Institute of Information Security & Cryptology, Vol 19, pp. 103-111, 2009.
|
10 |
Agrawal, D., Kesdogan, D., "Measuring Anonymity: The Disclosure Attack," IEEE Security & Privacy, pp. 27-34, 2003.
|
11 |
Back, A., Moller, U., Stiglic, "Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems," Information Hiding, Vol 2137, pp. 245-257, Oct 2001.
|
12 |
H. AND KOPSELL, S., "JAP: Java anonymous proxy, " http://anon.inf.tu-dresden.de/, 2006.
|
13 |
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D., "Low-Resource Routing Attacks Against Tor," Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11-20, 2007.
|
14 |
Borders, K., Prakash, A., "Web Tap: Detecting Covert Web Traffic," Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 110-120, Oct 2004.
|
15 |
Burch, H., Cheswick, B., "Tracing Anonymous Packets to Their Approximate Source," Proceedings of the 14th USENIX Conference on System Administration, pp. 319-328, Dec 2000.
|
16 |
S. J. and DANEZIS, G., "Low-cost traffic analysis of Tor," In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 183-195, 2005.
|
17 |
Kyungwan Ko, Daecheol Kim, "The Analyses of the Operational Efficiency and Efficiency Factors of Retail Stores Using DEA Model," The Korean Operations Research and Management Science Society, Vol 31, pp. 135-150, 2014.
|
18 |
Banker, R.D., Charnes, A and Cooper, W.W, "Some models for estimating technical and scale inefficiencies in data envelopment analysis, Management Science, pp. 1078-1092, 1984.
|
19 |
Lawrence M. Seiford, Joe Zhu, "Modeling undesirable factors in efficiency evaluation," European Journal of Operational Research, Vol 142, pp. 16-20, Oct 2002.
DOI
|
20 |
A. Kleine, "A general model framework for DEA," Omega, Vol 32, pp. 17-23, Feb 2004.
DOI
|
21 |
Barros, C. P., "Efficiency measurement among hypermarket and supermarket and the identification of the efficiency drivers : a case study," International Journal of Retail and Distribution Management, Vol.34, pp.135-154, 2006.
DOI
|
22 |
Taechang Ryu, "A Study on the Efficiency Evaluation of Traditional Market using a DEA Model" Korea Planning Association, Vol 46, pp. 257-270, Oct 2011.
|