References
- Zhang L., Afanasyev A., Burke J., Jacobson V., Claffy K., Crowley P., Papadopoulos C., Wang L. and Zhang B., "Named Data Networking," ACM SIGCOMM Computer Communication Review, Vol. 44, pp. 66-73, July 2014. https://doi.org/10.1145/2656877.2656887
- French A., and Shropshire J., "Handheld versus Traditional Computer Security Threats and Practices : A Comparison of End User Perceptions," Journal of Internet Electronic Commerce Research, Vol. 11, No. 2, pp. 153-171, June 2011.
- Kim J.-K., Jeon J.-H., and Lim H.-S., "The Effects of Information Security Policies, Security Controls and User's Characteristics on Anti-Virus Security Effectiveness," Journal of Information Systems, Vol. 15, No. 1, pp. 145-168, March 2006.
- Vellalacheuvu H. K., and Kumar S., "Effectiveness of Built-in Security Protection of Microsoft's Windows Server 2003 against TCP SYN Based DDoS Attacks," Journal of Information Security, Vol. 2, No. 3, pp. 131-138, July 2011.
- Lim S.-H.,. Lee B.-H, and Kim J.-H., "Diversity and Fault Avoidance for Dependable Replication Systems," Information Processing Letters, Vol. 108, pp.33-37, 15 Sep. 2008. https://doi.org/10.1016/j.ipl.2008.03.022
- Lim S.-H, "Replication Schemes for Dependable and Effective Mobile Systems," Ph.D. Dissertation, Ajou University. Feb. 2008.
- Schuba C., Krsul I., Kuhn M., Spafford E., Sundaram A. and Zamboni D., "Analysis of a Denial of Service Attack on TCP," Proc. of IEEE Symposium on Security and Privacy, May 1997.
- Bellaiche M. and Greoire J.-C., "SYN Flooding Attack Detection by TCP Handshake Anomalies," Security and Coomunication Networks, Vol 5, Issue 7, pp. 709-724, July 2012. https://doi.org/10.1002/sec.365
- Postel J., "Transmission Control Protocol - DARPA Internet Program Protocol Specification," RFC793, USC/Information Sciences Institute, Sept. 1981.
- Branden R., "Requirements for Internet Hosts - Communication Layers," RFC 1122, Internet Engineering Task Force, October 1989.
- Vaidya N. H., "On Checkpoint Latency," Proc. of the 1995 Pacific Rim International Symposium on Fault-Tolerant Systems, pp. 60-65, Dec. 1995.
- Young J. W., "A First Order Approximation to the Optimum Checkpoint Interval," Communications on the ACM, Vol.17, pp.530-531, Sept.1974. https://doi.org/10.1145/361147.361115
- Lim S.-H. and Kim J.-H., "Dynamic Security Level Changing Strategy using Attack Predictions-Case Study of TCP SYN Attacks," International Conference on IT Convergence and Security (ICITCS 2014), Beijing, Oct. 2014.
- Yoon S., Lee S. S., and Kim S.-H., "Seamless and Secure Service Framework using Multiple Network Interfaces Terminal in Heterogeneous Environment," Journal of the Korea Society Industrial Information System, Vol. 16, No. 4, pp. 53-65, Dec. 2011. https://doi.org/10.9723/jksiis.2011.16.4.053
- Kim S.-Y., Lee S. H., and Hwang H.-S., "A Study of Factors Affecting Attitude Towards Using Mobile Cloud Service," Journal of the Korea Society Industrial Information System, Vol. 18, No. 6, pp. 83-94, Dec. 2013. https://doi.org/10.9723/jksiis.2013.18.6.083
- Chang B.-H., Na J.-C., and Jang J.-S., "Network Security Situational Awareness using Traffic Pattern-Map," Journal of the Korea Society Industrial Information System, Vol. 11, No. 3, pp. 34-39, Sept. 2006.