참고문헌
- Van Jacobson, D. K. Smetters, James D. Thornton, Michael Plass, Nick Briggs, and Rebecca Braynard. Networking Named Content. In CoNext, 2009.
- Michael Meisel, Vasileios Pappas, and Lixia Zhang. Ad hoc networking via named data. In MobiArch'10. ACM, 2010. DOI: 10.1016/j.adhoc.2018.08.008
- Van Jacobson, D. K. Smetters, Nick Briggs, Michael Plass, Paul Stewart, James D. Thornton, and Rebecca Braynard. VoCCN: Voice-over Content-Centric Networks. In ReArch, 2009. DOI: 10.1145/1658978.1658980
- James Roberts. What QoS for the future internet? In The proceedings of FISS09, July 22, 2009.
- http://en.wikipedia.org/wiki/Named_data_networking
- Jae-Kyung Park, Strengthening Authentication Through Content Centric Networking, KSCI, Mar 24 2018.
- Jae-Kyung Park, A Network Translate System Using Next Generation Content Centric Networking Technology, KSCI, Mar 24 2018.
- Jae-Kyung Park, A Design of client BBS systems for Secure HVA, KSCI, Sep 21 2018.
- Michael Meisel, Vasileios Pappas, and Lixia Zhang. Ad hoc networking via named data. In MobiArch'10. ACM, 2010. DOI: 10.1145/1859983.1859986
- G. Loukas and G. Oke, "Protection against denial of service attacks: a survey," The Computer Journal, vol. 53, pp. 1020-1037, 2010. DOI: 10.1093/comjnl/bxp078
- M. Li, J. Li, and W. Zhao, "Simulation study of flood attacking of DDOS," in Proc of International Conference on Internet Computing in Science and Engineering 2008, pp. 286-293. DOI: 10.1109/icicse.2008.14
- W. Liu, "Research on DoS attack and detection programming," in Proc. of Third International Symposium on Intelligent Information Technology Application 2009, pp. 207-210. DOI: 10.1109/iita.2009.165
- J. Nazario, "DDoS attack evolution," Network Security, vol. 2008, pp. 7-10, 2008. DOI: 10.1016/s1353-4858(08)70086-2
- G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis, "Detecting DNS amplification attacks," in Critical Information Infrastructures Security, ed: Springer, 2008, pp. 185-196. DOI: 10.1007/978-3-540-89173-4_16
- M.-J. Chen, K.-P. Chien, C.-Y. Huang, B.-C. Cheng, and Y.-S. Chu, "An ASIC for SMTP Intrusion Prevention System," in Proc. of IEEE International Symposium on Circuits and Systems 2009, pp. 1847-1850. DOI: 10.1109/iscas.2009.5118138
- F. Huici, S. Niccolini, and N. d'Heureuse, "Protecting SIP against very large flooding DoS attacks," in Proc. of Global Telecommunications Conference 2009, pp. 1-6. DOI: 10.1109/glocom.2009.5425524
- J. Yu, H. Lee, M.-S. Kim, and D. Park, "Traffic flooding attack detection with SNMP MIB using SVM," Computer Communications, vol. 31, pp. 4212-4219, 2008. DOI: 10.1016/j.comcom.2008.09.018
- Van J., et al, "Networking Named Content", SIGCOMM Conference, 2009
- Hyung-Su Lee, Jae-Pyo Park, Jae-Kyung Park, "A Network Transport System Using Next Generation CCN Technology," Journal of The Korea Society of Computer and Information, Vol. 22, No. 10, pp. 93-100, Oct. 2017. https://doi.org/10.9708/jksci.2017.22.10.093
- Jae-Kyung Park, Won Joo Lee, Kang-Ho Lee, "A Study on the Isolated Cloud Security Using Next Generation Network" Journal of The Korea Society of Computer and Information Vol. 22 No. 11, pp. 41-48, November 2017. https://doi.org/10.9708/jksci.2017.22.01.041
- Sung-Jin Kim, Jae-Kyung Park, "Strengthening Authentication Through Content Centric Networking" Journal of The Korea Society of Computer and Information Vol. 22 No. 4, pp. 75-82, April 2017. https://doi.org/10.9708/jksci.2017.22.04.075
- Hyung-Su Lee, Jae-Pyo Park, Jae-Kyung Park, "A Network Transport System Using Next Generation CCN Technology" Journal of The Korea Society of Computer and Information Vol. 22 No. 10, pp. 93-100, October 2017. https://doi.org/10.9708/jksci.2017.22.10.093