1 |
D. Schnackengerg, H. Holliday, R. Smith, K. Djahandari, and D. Sterne, "Cooperative Intrusion Traceback and Response Architecture (CITRA)," Proceeding of Defense Advanced Research Project Agency Information Survivability Conference and Exposition II , pp. 56-68, 2001.
|
2 |
B. Park, T. Lee, and J. Kwak, "Blockchain-Based IoT Device Authentication Scheme," Journal of the Korea Institute of Information Security and Cryptology, Vol. 27, No. 2, pp. 343-351, 2017.
DOI
|
3 |
S. Sekharan and K. Kandasamy, "Profiling SIEM Tools and Correlation Engines for Security Analytics," Proceeding of International Conference on Wireless Communications, Signal Processing and Networking, pp. 717-721, 2017.
|
4 |
D. Olson and D. Delen, Advanced Data Mining Techniques, Springer, New York, 2008.
|
5 |
The BoT-IoT Dataset, https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php (accessed November 4, 2019).
|
6 |
Technology Strategies for IoT Security, https://www.zingbox.com/old-resources/technology-strategies-for-iot-security (accessed August 24, 2019).
|
7 |
C.M. Saranya and K.P. Nitha, "Analysis of Security methods in Internet of Things," International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 3, No. 4, pp. 1970-1974, 2015.
DOI
|
8 |
P. Kim and S. Kim, "Detecting Community Structure in Complex Networks Using an Interaction Optimization Process," International Journal of Physica A, Vol. 46, No. 5, pp. 525-542, 2017.
|
9 |
S. Ryu and S. Kim, "Development of an Integrated IoT System for Searching Dependable Device based on User Property," Journal of Korea Multimedia Society, Vol. 20, No. 5, pp. 791-799, 2017.
DOI
|
10 |
A. Buczak and E. Guven, "Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys and Tutorials, Vol. 18, No. 2, pp. 1153-1176, 2015.
DOI
|
11 |
K. Koh, S. Lee, and S. Ahn, "A Study on the Direction of Security Control of IoT Environment," Journal of Korea Convergence Security, Vol. 15, No. 5, pp. 53-59, 2015.
|