A study on preventative measures for ninja hacking
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, B. | - |
dc.contributor.author | Kim, R.Y.C. | - |
dc.contributor.author | Park, Y.B. | - |
dc.date.accessioned | 2021-10-12T08:44:24Z | - |
dc.date.available | 2021-10-12T08:44:24Z | - |
dc.date.created | 2021-10-08 | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/16441 | - |
dc.description.abstract | Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking. © 2014 IEEE. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE Computer Society | - |
dc.subject | Information science | - |
dc.subject | Anonymous | - |
dc.subject | Backdoor | - |
dc.subject | North Korea | - |
dc.subject | Personal computing | - |
dc.title | A study on preventative measures for ninja hacking | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, R.Y.C. | - |
dc.identifier.doi | 10.1109/ICISA.2014.6847344 | - |
dc.identifier.scopusid | 2-s2.0-84904489074 | - |
dc.identifier.bibliographicCitation | ICISA 2014 - 2014 5th International Conference on Information Science and Applications | - |
dc.relation.isPartOf | ICISA 2014 - 2014 5th International Conference on Information Science and Applications | - |
dc.citation.title | ICISA 2014 - 2014 5th International Conference on Information Science and Applications | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Information science | - |
dc.subject.keywordPlus | Anonymous | - |
dc.subject.keywordPlus | Backdoor | - |
dc.subject.keywordPlus | North Korea | - |
dc.subject.keywordPlus | Personal computing | - |
dc.subject.keywordAuthor | Anonymous | - |
dc.subject.keywordAuthor | Backdoor | - |
dc.subject.keywordAuthor | Closing network | - |
dc.subject.keywordAuthor | Ninja router | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.