1 |
KISA, "2019년도 7대 사이버 공격 전망," http://www.kisa.or.kr/notice/press_View.jsp?cPage=1&mode=view&p_No=8&b_No=8&d_No=1739&ST=&SV=
|
2 |
M. Antonakakis, et al. "Understanding the Mirai Botnet," In Proc. of 26 th USENIX Security Symposium, 2017.
|
3 |
B. Devi, et. al, "Analysis of MANET Routing Protocol in Presence of Worm-Hole Attack Using ANOVA Tool," International Journal of Pure and Applied Mathematics, vol.117, no.15, pp.1043-1055, 2017.
|
4 |
Andrea Holler, "Advances in Software-Based Fault Tolerance for Resilient Embedded Systems," Doctoral thesis, Graz University of Technology, 2016.
|
5 |
K. Kobara. "Cyber physical security for Industrial Control Systems and IoT," IEICE Transactions on Information and Systems, vol.E99.D no.4, pp.787-795, 2016. DOI: 10.1587/transinf.2015ICI0001
DOI
|
6 |
J. G. Ponsam, R. Srinivasan. "A survey on MANET security challenges, attacks and its countermeasures," International Journal of Emerging Trends & Technology in Computer Science, vol.3, no.1, pp.274-279, 2014.
|
7 |
Riverbed Modeler, https://www.riverbed.com/sg/products/steelcentral/steelcentral-riverbed-modeler.html
|
8 |
C. Alcaraz and J. Lopez, "A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems," IEEE Transactions on Systems, Man, and Cybernetics, vol.40, no.4, pp.419-428, 2010. DOI: 10.1109/TSMCC.2010.2045373
DOI
|
9 |
J. Lopez, R. Roman and C. Alcaraz, "Analysis of security threats, requirements, technologies and standards in wireless sensor networks," Foundations of Security Analysis and Design V, vol.5705, pp.289-338, 2009. DOI: 10.1007/978-3-642-03829-7_10
DOI
|
10 |
Z. Trifa, M. Khemakhem, "Sybil Nodes as a Mitigation Strategy against Sybil Attack," Procedia Computer Science, vol.32, pp.1135-1140, 2014. DOI: 10.1016/j.procs.2014.05.544
DOI
|
11 |
D. York, Seven Deadliest Unified Communications Attacks. Syngress, 2010.
|