1 |
H. Y. Kim, Internet of Things: Concept, Implementation Technology, and Business, Hongrung Science Pub. Co., pp. 314, 2014.
|
2 |
D. Lake, A. Rayes, M. Morrow, "The Internet of Things", The Internet Protocol Journal, vol. 15, no. 3, September 2012.
|
3 |
I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society (JKAIS), Vol. 11, No. 1, pp. 81-86, 2010.
|
4 |
I. H. Bae, C. H. Kim, H. T. Noh, "Design and Evaluation of a Fuzzy Logic based Multi-hop Broadcast Algorithm for IoT Application", Journal of Internet Computing and Services, vol. 17, no. 6, pp. 17-23, 2016. doi: 10.7472/jksii.2016.17.6.17.
DOI
|
5 |
I. H. Bae, "Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Application", Journal of Internet Computing and Services, vol. 19, no. 1, pp. 37-47, 2018. doi: 10.7472/jksii.2018.19.1.37.
DOI
|
6 |
C. W. Lee, IoT Vaccine, Hanbit Media Inc., pp. 300, 2017.
|
7 |
M. C. Chae, H. Lim, N. H. Kang, "Design of Multi-level Abnormal Detection System Suitable for Time-Series Data", Journal of the Institute of Internet, Broadcasting and Communication(IIBC) vol. 16, no. 6, pp. 1-7, 2016. doi: 10.7236/jiibc.2016.16.6.1.
DOI
|
8 |
Y. B. Kwon, I. S. Kim, "A Study on Anomaly Signal Detection and Management Model using Big Data", Journal of the Institute of Internet, Broadcasting and Communication(IIBC) vol. 16, no. 6, pp. 287-294, 2016. doi: 10.7236/jiibc.2016.16.6.287.
DOI
|
9 |
S. I. Lee, S. C. Lee, J. R. Lee, H. Y. Youm, "Extraction of Network Threat Signatures using Latent Dirichlet Allocation", Journal of Internet Computing and Services(JICS), vol. 19, no. 1, pp. 1-10, 2018. doi: 10.7472/jksii.2018.19.1.1.
DOI
|
10 |
S. J. Oh, "Design and Evaluation of a Weighted Intrusion Detection Method for VANETs", The Journal of the Institute of Internet and Broadcasting and Communication (IIBC), vol. 11, no. 3, pp. 181-188, June 2011.
|
11 |
K. Y. Kwack, Social Network Analysis, 2ed. Chungram Pub., pp. 690, 2017.
|
12 |
M. Akihiro, Google Analytics Access Kaiseki Kanzen Guide, Socym Co., pp. 239, 2014.
|