1 |
Jong Yeop Lee, Mi sun Yoon, Hoon Lee, "Monitoring and Investigation of DoS Attack", KNOM Review 2004
|
2 |
Alefiya Hussain, "Experience with a Continuous Network Tracing Infrastructure", ACM SIGCOMM'05 Workshops, 2005. DOI: http://dx.doi.org/10.1145/1080173.1080181
|
3 |
David Dagon, CliZou, and Wenke Lee. "Modeling botnet propagation using time zones". In Proceedings of the 13th Annual Network and Distributed System Security Symposium, 2006
|
4 |
David Dagon, Guofei Gu, Chris Lee, and Wenke Lee. "A taxonomy of botnet structures". In Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC'07), December 2007. DOI: http://dx.doi.org/10.1109/acsac.2007.44
|
5 |
E. Messmer. "Nugache worm kicking up a Storm", January 2008.
|
6 |
Ki Hoon Kwon, Young Goo Han, Seok Bong Jeong, Se Hun Kim, Soo Hyung Lee, Joong Chan Na, "Fast Detection Scheme for Broadband Network Using Traffic Analysis", KIISC, Vol14, No4, 2004
|
7 |
Soon Hwa Hong, "Monitoring and analysis of network traffic using Load Balancing Method", Master's thesis, 2002.
|
8 |
Les Cottrell and Connie Logg, "Throughput Time Series Patterns (Diurnal and Step Functions)", July 2004.
|
9 |
Beak Do Woon, "Implementation for L7 DDoS Defense", August 2014.
|
10 |
Lee Heon Jin, "A Study on The Complex Types DDoS Attacks and Protection", February 2014.
|
11 |
Byeong-uk Lee, Cheol-woong Lee, Seung-hun Shin, Byeong-hee Roh, "Implementaion of Modeling and Simulation for DDoS Attack and Detection in Wired Tractical Netwotk Usong OPNET Cyber Effect Model", KCI, Vol12, No2, 2016
|
12 |
Dongwon Seo, "Probabilistic Filter Propagation and Scheduling against Distributed Denial-of-Service Attacks", February 2014.
|
13 |
Sungmo Jung, "Global Network Security System to Prevent Cyber Attack", February 2014.
|