References
- KSN, KSN Repot: Ransomeware In 2014-2016, https://securelist.com/pc-ransomwarein-2014-2016/75145 (accessed Sep., 25, 2016).
- The Appearance of Cryptowall Updates and New Families of Ransomeware, https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cryptowall-updates-new-families-of-ransomware-found (accessed Sep., 28, 2016).
- TOR, http://torproject.org (accessed Jul., 3, 2016).
- What Kind of Structure is Anonymous Communication Tor, http://techholic.co.kr/archives/46127 (accessed Dec., 10, 2016).
- Onion Routing, https://www.onion-router.net (accessed Aug., 30, 2016).
- TrendMicro, Cybercrime Hits the Unexpected, 1st Quarter Intimidation Report, 2014.
- Korea Internet and Security Agency, Kr CERT/cc, Case Analysis for the Principle of Tor Network and Relative Malicious Code, 2014.
- J.Y. Seo, A Study on Enhancing Performance and Secrecy of Tor Anonymous Communication System, Master's Thesis of Ajou University of Technology, 2009.
- Red Sox, Hacking Team Traceback In-depth Analysis, https://thenewspro.org/?p=13534 (accessed Sept., 15, 2016).
- Akamai, Akamai's State of the Internet/Security, 2015.
- D. Easley and J. Kleniberg, Networks, Crowds, and Markets : Reasoning about a High Connected World, Cambridge University Press, Cambridge, U.K., 2010.
- M.H. Choi, B.T. Ahn, S.J. Kim, S.K. Ryu, and H.S. Kang, "An Operating Strategy of Outer Networking of University According to Traffic Efficiency Analysis," Journal of Korea Multimedia Society, Vol. 8, No. 1, pp. 119-127, 2005.