참고문헌
- Tarek S. Sobh, Yasser Aly, "Effective and Extensive Virtual Private Network," Journal of Information Security, 2011, 2, pp. 39-49 https://doi.org/10.4236/jis.2011.21004
- Dawson, Maurice & Cardenas-Haro, Jose , "Tails Linux Operating System: Remaining Anonymous with the Assistance of an Incognito System in Times of High Surveillance. International Journal of Hyperconnectivity and the Internet of Things," pp. 47-55, IJHIoT.2017010104, 2017
- Rutkowska, Joanna. "Qubes OS Architecture," 2010
- Sinha Sanjib,"Proxy Chains," 2017
- Sungmo Jung, Jong Hyun Kim and Seoksoo Kim, "A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment," ACN 2011, CCIS 199, pp. 31-35, 2011
- Alotaibi, Bandar; Elleithy, Khaled. 2016. "A New MAC Address Spoofing Detection Technique Based on Random Forests" Sensors 16, no. 3: 281.
- M. Anathi, K. Vijayakumar, "An intelligent approach for dynamic network traffic restriction using MAC address verification" Computer Communications, Volume 154, 2020, Pages 559-564, ISSN 0140-3664 https://doi.org/10.1016/j.comcom.2020.02.021
- Henry Chukwuemeka Paul and Kinn Abass Bakon, "A STUDY ON IPv4 and IPv6: THE IMPORTANCE OF THEIR CO-EXISTENCE," IJISE, Vol. 4 (No.2), November, 2016
- Sanjay, Balaji Rajandran and Pushparaj Shetty, "Domain Name System (DNS) Security: Attaacks Identification and Protection Methods," Int'l Conf. Security and Management , SAM'18, pp. 27-33
- Robert Wahlstedt and Dr. Mercer, "Towards a Secure Deployment of DNS," unpublished, December 11, 2019
- Mathy Vanhoef, Celestin Matte, Mathieu Cunche, Leonardo S. Cardoso and Frank Piessens,"Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms," AISA CSS '16, pp. 413-424
- Jung, Jaeyeon & Sit, Emil & Balakrishnan, Hari & Morris, Robert, "DNS Performance and the Effectiveness of Caching. ACM SIGCOMM Computer Communication Review," 2002
- Labrador, Jeyran & Cruz, Michael & Dinawanao, Dante ,"DNSFilter: An Erlang/OTP Implementation of a DNS-Based Web Filtering System," 2013
- S. J. Murdoch and G. Danezis, "Low-cost traffic analysis of Tor," 2005 IEEE Symposium on Security and Privacy (S&P'05), Oakland, CA, USA, 2005, pp. 183-195
- Renata Mekovec, "Onilne Privacy: Overview and Preliminary Research," JIOS, Vol. 34, No. 2, 2010
- Nora McDonald, Benjamin Mako Hill, Rachel Greenstadt and Andrea Forte, "Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers" CHI 2019
- Balazs Bodo, "Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism," INTERNET POLICY REVIEW Journal on internet regulation, Vol. 4, Issue 3