A Study on Preventative Measures for Ninja Hacking
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Byungho | - |
dc.contributor.author | Kim, R. Young Chul | - |
dc.contributor.author | Park, Young B. | - |
dc.date.accessioned | 2022-06-20T00:40:44Z | - |
dc.date.available | 2022-06-20T00:40:44Z | - |
dc.date.created | 2022-06-20 | - |
dc.date.issued | 2014 | - |
dc.identifier.issn | 2162-9048 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/29571 | - |
dc.description.abstract | Anonymous declared that it would hack North Korea, the world-wide closing country on June 25 in 2013, using internal supporters, but it is not known to have succeeded in hacking concretely. However, our previous study suggested hacking with Ninja gate, not with the existing method by connected routing. As a result of this study, we mentioned that even though it is a closing network, it will need a separate measure. This study suggests a countermeasure against Ninja Hacking. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.title | A Study on Preventative Measures for Ninja Hacking | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, R. Young Chul | - |
dc.identifier.wosid | 000346134200020 | - |
dc.identifier.bibliographicCitation | 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA) | - |
dc.relation.isPartOf | 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA) | - |
dc.citation.title | 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA) | - |
dc.type.rims | ART | - |
dc.type.docType | Proceedings Paper | - |
dc.description.journalClass | 3 | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Information Science & Library Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Information Science & Library Science | - |
dc.subject.keywordAuthor | Ninja router | - |
dc.subject.keywordAuthor | anonymous | - |
dc.subject.keywordAuthor | backdoor | - |
dc.subject.keywordAuthor | closing network | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.