1 |
A. Liska & G. Stowe. (2016). DNS network security. DNS Security, 93-119. DOI : 10.1016/b978-0-12-803306-7.00006-1
|
2 |
A. P. Siahaan. (2017). A Review of IP and MAC Address Filtering in Wireless Network Security. Int. J. Sci. Res. Sci. Technol, 3(6), 470-473. DOI : 10.31227/osf.io/g6emr
|
3 |
A. Liska & G. Stowe. (2016). Anycast and other DNS protocols. DNS Security, 193-206. DOI : 10.1016/b978-0-12-803306-7.00011-5
|
4 |
C. Sun, B. Liu & L. Shi. (2008). Efficient and Low-Cost Hardware Defense Against DNS Amplification Attacks. IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. (pp. 1-5). DOI : 10.1109/glocom.2008.ecp.397
|
5 |
E. Al-Shaer. (2014). Modeling and Verification of Firewall and IPSec Policies Using Binary Decision Diagrams. Automated Firewall Analytics, 25-48. DOI : 10.1007/978-3-319-10371-6_2
|
6 |
B. Wang, H. Chen & B. Zhang. (2013). Design and implementation of UDP-based terminal adaptive protocol. Journal of Computer Applications, 33(4), 943-946. DOI : 10.3724/sp.j.1087.2013.00943
DOI
|
7 |
DNS and IPv6. (2005). Pro DNS and BIND, 77-92. DOI : 10.1007/978-1-4302-0050-5_5
|
8 |
T. Kim & H. Ju. (2011). Effective DNS server fingerprinting method. 2011 13th Asia-Pacific Network Operations and Management Symposium. (pp. 1-4). IEEE. DOI : 10.1109/apnoms.2011.6076955
|
9 |
Document management. Change management for successful electronic document management system (EDMS) implementation. (2011). DOI : 10.3403/30181562
|
10 |
A. M. Lopes, J. P. Andrade & J. T. Machado. (2016). Multidimensional scaling analysis of virus diseases. Computer Methods and Programs in Biomedicine, 131, 97-110. DOI : 10.1016/j.cmpb.2016.03.029
DOI
|
11 |
M. Chen, Y. Liu, Z. Li, J. Xiao & J. Chen. (2016). A low jitter supply regulated charge pump PLL with self-calibration. Journal of Semiconductors, 37(1), 015006. DOI : 10.1088/1674-4926/37/1/015006
DOI
|
12 |
S. Hong. (2013). Countermeasure for Anti-financial hacking. Journal of Convergence for Information Technology, 3(1), 43-48.
|
13 |
S. Hong & S. Y. Jeong. (2018). The Analysis of CCTV Hacking and Security Countermeasure Technologies : Survey. Journal of Convergence for Information Technology, 8(6), 129-134. DOI : 10.22156/CS4SMB.2018.8.6.129
DOI
|
14 |
A. Liska & G. Stowe. (2016). Windows DNS security. DNS Security, 139-158. DOI : 10.1016/b978-0-12-803306-7.00008-5
|
15 |
P. S. Shin & J. M. Kim. (2014). Security and Hacking on Wireless Networking for Small and Medium Business : Survey. Journal of Convergence for Information Technology, 4(3), 15-20.
DOI
|
16 |
J. K. Cho. (2019). Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement. Journal of Convergence for Information Technology, 9(3), 1-7. DOI : 10.22156/CS4SMB.2019.9.3.001
DOI
|
17 |
M. Andrews & S. Weiler. (2006). The DNSSEC Lookaside Validation (DLV) DNS Resource Record. DOI : 10.17487/rfc4431
|