Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment
![]() |
Yang, Ho-Kyung
(광운대학교 방위사업학과)
Cha, Hyun-Jong (광운대학교 방위사업학과) Shin, Hyo-Young (경복대학 컴퓨터정보과) Ryou, Hwang-Bin (광운대학교 컴퓨터과학과) Jo, Yong-Gun (광운대학교 방위사업학과) |
1 | gajin Na et al, "Secure Mechanism to manage selfish nodes in Ad hoc Network", JIIC. 2004. |
2 | C.E Perkins and P.Bhagwat, "Routing over Multi-hop Wireless Network of Mobile Computers," SIGCOMM'94 : Computer Communications Review, pp.234-244, Oct, 1994. |
3 | In Sung Han, Hwang-Bin Ryou, Seok-Joong Kang, "Multi-Path Security-Aware Routing Protocol Mechanism for Ad Hoc Network," ichit, pp.620-626, 2006 International Conference on Hybrid Information Technology-Vol 1(ICHIT'06), 2006 |
4 | S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", ACM MOBICOM, 2000. |
5 | T. Murata and H. Ishibuchi, "Performance evaluation of genetic algorithms for flows hop scheduling problems," Proc. 1st IEEE Conf. Evolutionary Computation, vol. 2, pp. 812-817, June 1994 |
6 | 배달형, 조용건, "NCW 컴퓨터네트워크작전 (CNO)의 작전적 원리와 한국군의 발전방향", 국방연구, 2009. 08 |
7 | 고석주, " 소부대 지휘자 통신체계 구현방안 연구", 배재대학교 정보통신대학원, 2005.12 |
8 | Andrew S. Tanenbaum. "Computer Network." Prentice-Hell International Inc., Second Edition, pp.345-374, 1996. |
![]() |