참고문헌
- A. Liska & G. Stowe. (2016). DNS network security. DNS Security, 93-119. DOI : 10.1016/b978-0-12-803306-7.00006-1
- A. P. Siahaan. (2017). A Review of IP and MAC Address Filtering in Wireless Network Security. Int. J. Sci. Res. Sci. Technol, 3(6), 470-473. DOI : 10.31227/osf.io/g6emr
- A. Liska & G. Stowe. (2016). Anycast and other DNS protocols. DNS Security, 193-206. DOI : 10.1016/b978-0-12-803306-7.00011-5
- C. Sun, B. Liu & L. Shi. (2008). Efficient and Low-Cost Hardware Defense Against DNS Amplification Attacks. IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. (pp. 1-5). DOI : 10.1109/glocom.2008.ecp.397
- E. Al-Shaer. (2014). Modeling and Verification of Firewall and IPSec Policies Using Binary Decision Diagrams. Automated Firewall Analytics, 25-48. DOI : 10.1007/978-3-319-10371-6_2
- B. Wang, H. Chen & B. Zhang. (2013). Design and implementation of UDP-based terminal adaptive protocol. Journal of Computer Applications, 33(4), 943-946. DOI : 10.3724/sp.j.1087.2013.00943
- DNS and IPv6. (2005). Pro DNS and BIND, 77-92. DOI : 10.1007/978-1-4302-0050-5_5
- T. Kim & H. Ju. (2011). Effective DNS server fingerprinting method. 2011 13th Asia-Pacific Network Operations and Management Symposium. (pp. 1-4). IEEE. DOI : 10.1109/apnoms.2011.6076955
- Document management. Change management for successful electronic document management system (EDMS) implementation. (2011). DOI : 10.3403/30181562
- A. M. Lopes, J. P. Andrade & J. T. Machado. (2016). Multidimensional scaling analysis of virus diseases. Computer Methods and Programs in Biomedicine, 131, 97-110. DOI : 10.1016/j.cmpb.2016.03.029
- M. Chen, Y. Liu, Z. Li, J. Xiao & J. Chen. (2016). A low jitter supply regulated charge pump PLL with self-calibration. Journal of Semiconductors, 37(1), 015006. DOI : 10.1088/1674-4926/37/1/015006
- S. Hong. (2013). Countermeasure for Anti-financial hacking. Journal of Convergence for Information Technology, 3(1), 43-48.
- S. Hong & S. Y. Jeong. (2018). The Analysis of CCTV Hacking and Security Countermeasure Technologies : Survey. Journal of Convergence for Information Technology, 8(6), 129-134. DOI : 10.22156/CS4SMB.2018.8.6.129
- P. S. Shin & J. M. Kim. (2014). Security and Hacking on Wireless Networking for Small and Medium Business : Survey. Journal of Convergence for Information Technology, 4(3), 15-20. https://doi.org/10.22156/CS4SMB.2014.4.3.015
- J. K. Cho. (2019). Study on Improvement of Vulnerability Diagnosis Items for PC Security Enhancement. Journal of Convergence for Information Technology, 9(3), 1-7. DOI : 10.22156/CS4SMB.2019.9.3.001
- M. Andrews & S. Weiler. (2006). The DNSSEC Lookaside Validation (DLV) DNS Resource Record. DOI : 10.17487/rfc4431
- A. Liska & G. Stowe. (2016). Windows DNS security. DNS Security, 139-158. DOI : 10.1016/b978-0-12-803306-7.00008-5