References
- Y. H. Kim, "Theoretical Implication on Establishing the National Countermeasure System against Cyber Crime - Focusing on a Pattern of Cyber Terror -," Journal of the Korea Society of Computer and Information, Vol. 14, No. 6, pp. 165-171, June 2009.
- M. S. Jang, J. I. Lee, C. S. Oh, "Harmful Traffic Control Using Sink Hole Routing," Journal of the Korea Society of Computer and Information, Vol. 14, No. 4, pp. 69-76, April 2009.
- K. H. Kim, et al., "Accredited by the device identifier location-based security techniques," Journal of the Korea Institute of Entertainment Industry Spring Conference, pp. 186-194, May 2011.
- Y. B. Kim, H. Y. Youm, "A New Bot Disinfection Method Based on DNS Sinkhole," Journal of the Korea Institute of Information Security and Cryptology, Vol. 18, No. 6(A), pp. 107-114, Dec. 2008.
- D. W. Kang, et al., "Recent trends and the corresponding technical studies malicious behavior of botnets," Korea Institutes of Information Security and Cryptology, Vol. 19, No. 6, pp. 22-31, Dec. 2009.
- Y. B. Kim, et al., "Preventing Botnet Damage Technique and It's Effect using Bot DNS Sinkhole," Journal of the Korea Institute of Information Security and Cryptology, Vol. 15, No. 1, pp. 47-55, Jan. 2009.
- J. H. Lee, et al., "The Address Detection Algorithm to Avoid DHCP NAK Loop Problem in Virtual LAN," Journal of Korea Information Science Society Fall Conference, Vol. 29, No. 2, pp. 604-606, 2002.
- DHCP Server Callout API usage, http://blogs.technet.com/b/ teamdhcp/archive/2009/07/06/dhcp-server-callout-api-usage.aspx
- DHCP Server Callout API Reference, http://msdn.microsoft.com/en-us/library/windows/desktop/aa363373(v=vs.85).aspx