References
- S. Li, L. D. Xu, and S. Zhao, "The internet of things: a survey," Information Systems Frontiers, Springer, Vol. 17, No. 2, pp. 243-259, April 2015. DOI: https://doi.org/10.1007/s10796-014-9492-7.
- Jeongin Kim, Namhi Kang, "Secure Configuration Scheme for Internet of Things using NFC as OOB Channel," The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 16, No. 03, pp.13-19, June 2016. DOI: https://doi.org/10.7236/JIIBC.2016.16.3.13
- Jiye Park, Namhi Kang, "Design of Smart Service based on Reverse-proxy for the Internet of Things," The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 14, No. 06, pp.1-6, Dec. 2014. DOI: https://doi.org/10.7236/JIIBC.2014.14.6.1
- Myungcheol Lee, Daesung Moon, Ikkyun Kim, "Real-time Abnormal Behavior Detection System based on Fast Data," Journal of the Korea Institute of Information Security and Cryptology, Vol. 25, No. 5, pp.1027-1041, Oct. 2015. DOI: https://doi.org/10.13089/JKIISC.2015.25.5.102
- Colin Tankard, "Advanced persistent threats and how to monitor and deter them," Network Security, Vol. 2011, No. 8, pp. 16-19, Aug. 2011. DOI: https://doi.org/10.1016/S1353-4858(11)70086-1
- Mark Stamp, "Information Security, Principles and Practice," Wiley, ISBN 978-0-470-62639-9, May 2011.
- Z. Zulkefli, M. M. Singh, N. H. A. H. Malim, "Advanced Persistent Threat Mitigation Using Multi Level Security - Access Control Framework," Vol. 9158, LNCS, Springer, pp 90-105, June 2015. DOI: https://doi.org/10.1007/978-3-319-21410-8_7
- Elshoush. H. Tagelsir. and I. M. Osmank, "Alert correlation in collaborative intelligent intrusion detection systems - A survey." Applied Soft Computing In Press, Vol. 11, No. 7, pp.4349-4365, Oct. 2011. DOI: https://doi.org/10.1016/j.asoc.2010.12.004
- Chan-young Choi, Dea-woo Park, "The Analysis of the APT Prelude by Big Data Analytics," Journal of the Korea Institute of Information and Communication Engineering, Vol. 20, No. 6, pp.1129-1135, June 2016. DOI : https://doi.org/10.6109/jkiice.2016.20.6.1129
- Ho-sub Lee, Eung-ki Park, Jung-taek Seo, "A New Method to Detect Anomalous State of Network using Information of Clusters," Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp. 545-552, June 2012.
- Kyungho Son, Taijin Lee, Dongho Won, "Design for Zombie PCs and APT Attack Detection based on traffic analysis," Journal of The Korea Institute of Information Security & Cryptology, VOL.24, NO.3, Jun. 2014. DOI : https://doi.org/10.13089/JKIISC.2014.24.3.491
- Poonam Sinai Kenkre, Anusha Pai, Louella Colaco, "Real Time Intrusion Detection and Prevention System," Proc. of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), pp. 405-411, 2014. DOI: https://doi.org/10.1007/978-3-319-11933-5_44