1 M. Antonakakis, "Understanding the Mirai Botnet" 2017
2 Zied Trifa, "Sybil Nodes as a Mitigation Strategy Against Sybil Attack" Elsevier BV 32 : 1135-1140, 2014
3 D. York, "Seven Deadliest Unified Communications Attacks" Syngress 2010
4 "Riverbed Modeler"
5 Kazukuni KOBARA, "Cyber Physical Security for Industrial Control Systems and IoT" Institute of Electronics, Information and Communications Engineers (IEICE) E99.D (E99.D): 787-795, 2016
6 J. Lopez, "Analysis of security threats, requirements, technologies and standards in wireless sensor networks" 5705 : 289-338, 2009
7 B. Devi, "Analysis of MANET Routing Protocol in Presence of Worm-Hole Attack Using ANOVA Tool" 117 (117): 1043-1055, 2017
8 Andrea Höller, "Advances in Software-Based Fault Tolerance for Resilient Embedded Systems" Graz University of Technology 2016
9 J. G. Ponsam, "A survey on MANET security challenges, attacks and its countermeasures" 3 (3): 274-279, 2014
10 Cristina Alcaraz, "A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems" Institute of Electrical and Electronics Engineers (IEEE) 40 (40): 419-428, 2010
1 M. Antonakakis, "Understanding the Mirai Botnet" 2017
2 Zied Trifa, "Sybil Nodes as a Mitigation Strategy Against Sybil Attack" Elsevier BV 32 : 1135-1140, 2014
3 D. York, "Seven Deadliest Unified Communications Attacks" Syngress 2010
4 "Riverbed Modeler"
5 Kazukuni KOBARA, "Cyber Physical Security for Industrial Control Systems and IoT" Institute of Electronics, Information and Communications Engineers (IEICE) E99.D (E99.D): 787-795, 2016
6 J. Lopez, "Analysis of security threats, requirements, technologies and standards in wireless sensor networks" 5705 : 289-338, 2009
7 B. Devi, "Analysis of MANET Routing Protocol in Presence of Worm-Hole Attack Using ANOVA Tool" 117 (117): 1043-1055, 2017
8 Andrea Höller, "Advances in Software-Based Fault Tolerance for Resilient Embedded Systems" Graz University of Technology 2016
9 J. G. Ponsam, "A survey on MANET security challenges, attacks and its countermeasures" 3 (3): 274-279, 2014
10 Cristina Alcaraz, "A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems" Institute of Electrical and Electronics Engineers (IEEE) 40 (40): 419-428, 2010
11 KISA, "2019년도 7대 사이버 공격 전망"