References
- G. Jin, CISCO Networking, vol. 2, Seoul, Korea, Sung An Dang, March 2011, pp. 132.
- D. Eck, "Access Control Lists to Protect a Network from Worm/DoS Attacks,"GSEC(:GIAC(:Global Information Assurance Certification) Security Essentials Certification) Practical Assignment, ver. 1.4, Option 1, Dec 4, 2003, pp. 1-22.
- R. Tolani, "Better Security through Access-List Management," Global Knowledge Training LLC(:Limited Liability Company), Jan. 2007, pp. 1-8.
- N. Navato, "Easy Steps to Cisco Extended Access List," GSEC(:GIAC(:Global Information Assurance Certification) Security Essentials Certification) Practical Assignment, ver. 1.2e, June 2001, pp. 1-10.
- S. Kaushik, A. Tomar, and Poonam, "Access Control List Implementation in a Private Network," International Journal of Information & Computation Technology. vol. 4, no. 14, 2014, pp. 1361-1366.
- K. Kim and S. Park, "Access-Control List research on the impact on performance MPLS GE," Conf. of the Korea Information Processing Society, Seoul, Korea, vol. 12, no. 1, May 2005, pp. 1397-1400.
- N. Kim, "The case study for verification of ACL(Access List)," Conf. of the Korea Institute of Electronic Communication Sciences, Sokcho, Korea, vol. 9, no. 2, Nov. 2015, pp. 164-167.
- W. Seo and M. Jun, "A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area," J. of The Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, Dec. 2010, pp. 625-630.
- C. Lee, "A Study on MD5 Security Routing based on MANET," J. of the Korea Institute of Electronic Communication Sciences, vol. 7, no. 4, Aug. 2012, pp. 797-803.
- C. Lee, "A Routing Security Authentication using S-EKE in MANET Environments," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 11, Apr. 2014, pp. 433-438. https://doi.org/10.13067/JKIECS.2014.9.4.433