1 |
Zargar, S.T.,Joshi, J.and Tipper, D. 2013. A surver of defense mechanisms against distributed denial of service DDoS flooding attacks, Communications Survers & Tutorials, IEEE, 15(4) : 2046-2069
DOI
|
2 |
H-D. Lee, H-T. Ha, H-C Baek, C-G. Kim, and S-B. Kim, Efficient detction and defence model against IP spoofing attack through cooperation of trusted hosts, Journal of the Korea Institute of Information and Communication Engineering, Vol. 24, No. 12, pp. 2649-2656, 2012.
|
3 |
R-W. Huang, X-L. Gui, S. Yu, and W. Zhuang, Privacy-Preserving Computable Encryption Scheme of Cloud Computing, Chinese Journal of Computers, Vol. 34, No. 12, pp. 2391-2402, 2011.
DOI
|
4 |
Y, H. Jung, "A Study of the Android OS based touch macro detection method", Korea Univ., 2016.
|
5 |
Telecommunication Technology Association 2008. Botnat trend and respond technology present, TTA Journal, 118 (Special Report) : 58-65.
|
6 |
W. I. Kim, S. H. Yoo, Y. C. Jang and C.H. Lee, "A Design and Implementation of Abnormal Permission-Flow Detecting Security Module", J. of Korean Institute of Next Generation Computing, Vol.10, No. 2, pp 66-74, 2014.
|
7 |
J.z. Li, and X.M. Liu An important aspect of big data : Data usability, School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, pp. 1147-1162, 2013.
|
8 |
D. Pansa and T. Chomsiri, Architecture and Protocols for Secure LAN by Using a Software-level Certificate and Cancellation of ARP Protocol, Third 2008 International Conference on Convergence and Hybrid Information Technology, pp. 21-26, 2008.
|
9 |
Shin, Y. H. Lim, G. H and Im, E. G. 2009. A Research on the possibility of ARP spoofing attack in SCADA System Based on TCP/IP environment. Convergence security journal, 9(3) : 9-17.
|
10 |
D.-S. Choi, D.-H. Oh, J.-S. Park, J.-C. Ha, An Improved Round Reduction Attack on Triple DES Using Fault Inj-ection in Loop Statement, Journal of The Korea Institute of Information Security & Cryptology, Vol. 22, No. 4. pp 709-717, 2012.
|
11 |
M-H Kim, H-C Beak, S-W Hong and J-H Park, 2015. An Encrypted Service Data Model for Using Illegal Applications of the Government Civil Affairs Service under Big Data Environments, Convergence security journal, Vol. 15No. 7, pp. 31-38, 2015.
|
12 |
C. H. An, "Medical treatment cluster composition and security model design of regional public hospitals in Korea for telemedicine", Gyengsang Univ., 2016.
|
13 |
C. H, An, H. C. Baek, Y. G. Seo, W. C. Jeong, and S. B. Kim. "Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment", Convergence security journal, Vol. 16, No. 7, pp. 21-29, 2016.
|
14 |
Y-J Baek, S-W Hong, J-H Park, G-W Gang, S-B Kim, "A Macro Attacks Detection Model Based on Trace Back Information", Convergence security journal, Vol. 18, No. 5, pp. 113-120, 2018.
|
15 |
Y. T. Mu, H. C. Baek, J. Y. Choi, W. C. Jeong, and S. B. Kim, "A Proposal of a Defence Model for the Abnormal Data Collection using Trace Back Information in Big Data Environments", Journal of the Korea Institute of Information and Communication Engineering, Vol. 10, No. 2, 2015.
|