1 |
S. H. Hong & H. J. Shin. (2017). Analysis of the Vulnerability of the IoT by the Scenario. Journal of the Korea Convergence Society, 8(9), 1-7.
DOI
|
2 |
J. O. Park. (2016). A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment. Journal of Digital Convergence, 14(10), 295-302.
DOI
|
3 |
Maciej Kranz. (2017). The Core Objects of the Fourth Industrial Revolution The Future of the Internet IoT Innovation : First Books Publishing. ISBN 979-11-7022-121-0 03320 / 2017.7.24.001
|
4 |
Things Internet World Forum Architecture Committee 2015. http://iotforum.kr
|
5 |
Gartner. Top 10 Internet of Things Technologies for 2017 and 2018. https://www.gartner.com
|
6 |
R. Di Pietro, S. Guarino, N. Verde & J. Domingo-Ferrer. (2014). Security in wireless ad-hoc networks-a survey. Comput. Commun. 51, 1-20.
DOI
|
7 |
H. Gaur. (2013). Internet of things: thinking services.
|
8 |
D. Miorandi, S. Sicari, F. De Pellegrini & I. Chlamtac. (2012). Internet of things: vision, applications and research challenges. Ad Hoc networks, 10(7), 1497-1516.
DOI
|
9 |
R. Roman & J. Zhou. (2013). On the features and challenges of security and privacy in distributed internet of things. Comput. Networks, 57(10), 2266-2279.
DOI
|
10 |
R. H. Weber. (2013). internet of things-govemance quo vadis. Comput. Law Security Rev, 29(4), 341-347.
DOI
|
11 |
J. H. Kim, H. M. Jung & H. J. Cho. (2017). Design Plan of Secure IoT System based Common Criteria. Journal of the Korea Convergence Society, 8(10), 61-66.
DOI
|
12 |
K. S. Jeon. (2016). IoT Security. https://kisa.or.kr
|
13 |
J. O. Park. (2015). Verifying a Safe P2P Security Protocol in M2M Communication Environment. Journal of Digital Convergence, 13(5), 213-218.
DOI
|
14 |
J. N. Kim & H. H. Jin. (2017). Internet(Iot) Security Technology for Security Threats in Second Connection Environment. The Journal of The Korean Institute of Communication Sciences, 34(3), 57-64.
|
15 |
S. Li & L. Xu. (2017). Securing the Internet of Things : Acorn Publishing. ISBN 979-11-6175-039-2 / 2017.8.30.001
|
16 |
B. Russell & D. V. Duren. (2017). Things Security Guide for the Internet Age : Acorn Publishing. ISBN 979-11-6175-041-5 / 2017.8.30.001
|
17 |
S. S. Jang (2016). General Information Protection : Saengneung Publishing. ISBN 978-89-7050-848-1 93000 / 2016.10.31.001
|
18 |
S. H. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26.
DOI
|
19 |
J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT). Journal of the Korea Convergence Society, 9(4), 31-45.
DOI
|
20 |
H. Im, J. W. Kim, J. Na, T. J. Ha & C. Jung. (2016. 7). Intrusion detection method in network. Seoul : Metrocomnet Co., Ltd. ICT Research Institute
|
21 |
M. H. Kang (2016). Completion of IDS and security control : Wowbooks Publishing. ISBN 978-89-94405-14-8 13560 / 2016.3.8.00
|