[confproc]
M. F. Razali
/ 2018
/ IoT Honeypot: A Review from Researcher’s Perspective
/ Proceedings of the 2018 IEEE Conference on Applications, Information and Network Security
: 93~98
[web]
J. Rivera
/ Gartner Says 4.9 Billion Connected ‘Things’ Will Be in Use in 2015
/ http://www.gartner.com/newsroom/id/2905717
[confproc]
R. E. Navas
/ 2018
/ Demo: Do Not Trust Your Neighbors!A Small IoT Platform Illustrating a Man-in-the-Middle Attack
/ Proceedings of the 17th International Conference on Ad Hoc Networks and Wireless
: 120~125
[journal]
강구홍
/ 2017
/
Analysis of Threat Model and Requirements in Network-based Moving Target Defense
/ 한국컴퓨터정보학회논문지
/ 한국컴퓨터정보학회
22(10)
: 83~92
[journal]
박태근
/ 2018
/
Design of a Protected Server Network with Decoys for Network-based Moving Target Defense
/ 한국컴퓨터정보학회논문지
/ 한국컴퓨터정보학회
23(9)
: 57~64
[confproc]
D. Kewley
/ 2001
/ Dynamic Approaches to Thwart Adversary Intelligence Gathering
/ Proceedings of the DARPA Information Survivability Conference and Exposition
: 176~185
[confproc]
M. Atighetchi
/ 2003
/ Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
/ Proceedings of the sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
: 183~192
[journal]
S. Antonatos
/ 2007
/ Defending against Histlist Worms using Network Address Space Randomization
/ Computer Networks
51(12)
: 3471~3490
[journal]
J. H. Jafarian
/ 2015
/ An Effective Address Mutation Approach for Distructing Reconnaissance Attacks
/ IEEE Transactions on Information Forensics
10(12)
: 2562~2577
[confproc]
J. Sun
/ 2016
/ DESIR: Decoy-enhanced seamless IP randomization
/ Proceedings of the IEEE INFOCOM
[confproc]
J. H. Jafarian
/ 2016
/ Multi-dimensional Host Identity Anonymization for Defeating Skilled Attacks
/ Proceedings of the 2016 ACM Workshop on Moving Target Defense
: 47~58
[journal]
T. Park
/ 2018
/ A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks
/ IEICE Trans. Inf. & Syst
E101-D(11)
[other]
K. Park
/ 2018
/ Pseudonym Address based Hidden Tunnel Networking for Network Address Mutation
/ KOREA Patent App. No. 10-2018-0076029
[confproc]
M. Dunlop
/ 2011
/ MT6D : a moving target IPv6 defense
/ Proceedings of the Military Communications Conference
: 1321~1326
[other]
S. Deering
/ 1998
/ Internet Protocol, Version 6(IPv6)Specication
/ RFC 2460, Updated by RFCs 5095, 5722, 5871, 6437, 6564, 6935,6946
[thesis]
C. F. Morrell
/ 2016
/ Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense
/ Blacksburg
/ Virginia Tech
[confproc]
D. J. Bernstein
/ 2006
/ Curve25519: new die-hellman speed records
/ Proceedings of the 9th Iternational Conference on Theory and Practice in Public Key Cryptography
/ Springer
: 207~228
[other]
A. Brandt
/ 2012
/ RPL : IPv6 routing protocol for low-power and lossy networks
/ RFC 6550
[journal]
S. Oh
/ 2018
/ A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks
/ International Journal of Distributed Sensor Networks
14(4)
[confproc]
A. Kamble
/ 2017
/ Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
/ Proceedings of 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI)
: 33~39