{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T00:40:01Z","timestamp":1751157601312,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811076046"},{"type":"electronic","value":"9789811076053"}],"license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7605-3_35","type":"book-chapter","created":{"date-parts":[[2017,12,19]],"date-time":"2017-12-19T11:22:45Z","timestamp":1513682565000},"page":"210-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of Network Cyber Attack Training Curriculum for Security Staff"],"prefix":"10.1007","author":[{"given":"Guk-IL","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jonghyeon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"issue":"6","key":"35_CR1","doi-asserted-by":"publisher","first-page":"678","DOI":"10.9717\/kmms.2013.16.6.678","volume":"16","author":"J-H Huh","year":"2013","unstructured":"Huh, J.-H., et al.: Implementation of DDoS botnet detection system on local area network. J. Korea Multimed. Soc. 16(6), 678\u2013688 (2013). (In Korean)","journal-title":"J. Korea Multimed. Soc."},{"issue":"2","key":"35_CR2","doi-asserted-by":"publisher","first-page":"411","DOI":"10.9717\/kmms.2016.19.2.411","volume":"19","author":"J-H Huh","year":"2016","unstructured":"Huh, J.-H., Seo, K.: A case study of the base technology for the smart grid security: focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using CUDA. J. Korea Multimed. Soc. 19(2), 411\u2013417 (2016)","journal-title":"J. Korea Multimed. Soc."},{"issue":"2","key":"35_CR3","first-page":"37","volume":"9","author":"J-H Huh","year":"2015","unstructured":"Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37\u201348 (2015)","journal-title":"Int. J. Secur. Appl. SERSC"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Kajioka, S., Mori, T., Uchiya, T., Takumi, I., Matsuo, H.: Experiment of indoor position presumption based on RSSI of bluetooth LE beacon. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 337\u2013339. IEEE (2014)","DOI":"10.1109\/GCCE.2014.7031308"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Huh, J.-H.: Design and android application for monitoring system using PLC for ICT-Integrated Fish Farm. In: MUE 2016. LNEE, vol. 393, pp. 617\u2013625 (2016)","DOI":"10.1007\/978-981-10-1536-6_80"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Huang, H., Gartner, G., Schmidt, M., Li, Y.: Smart environment for ubiquitous indoor navigation. In: International Conference on New Trends in Information and Service Science, NISS 2009, pp. 176\u2013180. IEEE (2009)","DOI":"10.1109\/NISS.2009.16"},{"issue":"1","key":"35_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-016-0060-7","volume":"6","author":"J-H Huh","year":"2016","unstructured":"Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. 6(1), 1\u201321 (2016). Springer, Berlin, Heidelberg","journal-title":"Hum.-centric Comput. Inf. Sci."},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Huh, J.-H., Je, S.-M., Seo, K.: Communications-based technology for smart grid test bed using OPNET simulations. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 227\u2013233. Springer (2016)","DOI":"10.1007\/978-981-10-0557-2_23"},{"issue":"5","key":"35_CR9","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1007\/s11227-016-1672-4","volume":"72","author":"J-H Huh","year":"2016","unstructured":"Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862\u20131877 (2016). Springer, USA","journal-title":"J. Supercomput."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Park, J., et al.: Design of the real-time mobile push system for implementation of the shipboard smart working. In: Advances in Computer Science and Ubiquitous Computing (CUTE 2015). LNEE, vol. 373, pp. 541\u2013548. Springer (2015)","DOI":"10.1007\/978-981-10-0281-6_78"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Peng, J., Chen, H.: A GPU-based high performance multi-string matching system. In: Proceeding of IEEE International Conference on Future Computer and Communication, vol. 1, pp. 66\u201381 (2010)","DOI":"10.1109\/ICFCC.2010.5497832"},{"key":"35_CR12","unstructured":"Schatz, M., Trapnell, C.: Fast Exact String Matching on the GPU, pp. 1\u20136. Citeseer (2007)"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Lin, C.H., Tsai, S.Y., Liu, C.H., Chang, S.C.: Accelerating string matching using multithreaded algorithm on GPU. In: Proceeding of IEEE Global Telecommunications Conference, pp. 1\u20135 (2010)","DOI":"10.1109\/GLOCOM.2010.5683320"},{"issue":"2","key":"35_CR14","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1137\/0206024","volume":"6","author":"D Knuth","year":"1977","unstructured":"Knuth, D., Morris, J., Pratt, V.: Fast pattern matching in strings. SIAM J. Comput. 6(2), 323\u2013350 (1977)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"35_CR15","first-page":"13","volume":"38","author":"D Paessler","year":"2008","unstructured":"Paessler, D.: Server virtualization and network management. Database Netw. J. 38(5), 13\u201316 (2008)","journal-title":"Database Netw. J."},{"issue":"5","key":"35_CR16","first-page":"26","volume":"12","author":"C Taylor","year":"2006","unstructured":"Taylor, C.: Consolidation Server: How to enhance utilization of servers and storage. Manuf. Comput. Solut. 12(5), 26 (2006)","journal-title":"Manuf. Comput. Solut."},{"issue":"9","key":"35_CR17","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1016\/j.comnet.2013.04.004","volume":"57","author":"JF Botero","year":"2013","unstructured":"Botero, J.F., Hesselbach, X.: Greener networking in a network virtualization environment. Comput. Net. 57(9), 2021\u20132039 (2013)","journal-title":"Comput. Net."},{"issue":"11","key":"35_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2013.6658648","volume":"51","author":"R Jain","year":"2013","unstructured":"Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24\u201331 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"35_CR19","doi-asserted-by":"publisher","first-page":"488","DOI":"10.4028\/www.scientific.net\/AMM.307.488","volume":"307","author":"GY Zhao","year":"2013","unstructured":"Zhao, G.Y., Tang, H.F., Xiao, L.M., Li, X.Q.: Efficient inline deduplication on VM images in desktop virtualization environment. Appl. Mech. Mater. 307, 488\u2013493 (2013)","journal-title":"Appl. Mech. Mater."},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, B., Luo, Y.: Optimizing interactive performance for desktop-virtualization environment optimizing interactive performance for desktop-virtualization environment. Lecture Notes in computer science (LNCS), vol. 7719, pp. 541\u2013555. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-37015-1_47"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Cohen, E., Paul, W., Schmaltz, S.: Theory of multi core hypervisor verification. Lecture Notes in Computer Science (LNCS), pp. 1\u201327. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-35843-2_1"},{"key":"35_CR22","unstructured":"Huh, J.-H.: Designing and Implementation of Networks Learning Systems by Using Virtual Computers. Thesis of Department of Computer Science Education, Pukyong National University at Daeyeon, pp. 1\u201377 (2012)"},{"issue":"6","key":"35_CR23","first-page":"861","volume":"7","author":"J-H Huh","year":"2017","unstructured":"Huh, J.-H.: Designing of image processing curriculum considering network security. Asia Pac. J. Multimed. Serv. Converg. Art Humanit. Sociol. 7(6), 861\u2013869 (2017)","journal-title":"Asia Pac. J. Multimed. Serv. Converg. Art Humanit. Sociol."},{"key":"35_CR24","doi-asserted-by":"crossref","unstructured":"Wang, S., Xu, D., Yan, S.: Analysis and application of Wireshark in TCP\/IP protocol teaching. In: 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies, IEEE EDT, pp. 269\u2013272 (2010)","DOI":"10.1109\/EDT.2010.5496372"},{"issue":"3","key":"35_CR25","first-page":"29","volume":"8","author":"Y-K Bae","year":"2005","unstructured":"Bae, Y.-K., Lim, J.-S., Lee, T.-W.: A study on the improvement directions of computer curriculum in elementary school. J. Korean Assoc. Comput. Educ. 8(3), 29\u201342 (2005). (In Korean)","journal-title":"J. Korean Assoc. Comput. Educ."},{"issue":"2","key":"35_CR26","first-page":"133","volume":"1","author":"J-H Huh","year":"2014","unstructured":"Huh, J.-H., Seo, K.: Development of competency-oriented social multimedia computer network curriculum. J. Multimed. Inf. Syst. Korea Multimed. Soc. 1(2), 133\u2013142 (2014)","journal-title":"J. Multimed. Inf. Syst. Korea Multimed. Soc."},{"issue":"2","key":"35_CR27","first-page":"27","volume":"3","author":"J-H Huh","year":"2016","unstructured":"Huh, J.-H.: Information communication ethical study on the protection of digital copyrights and alternatives: focusing on the secondary school students. J. Multimed. Inf. Syst. Korea Multimed. Soc. 3(2), 27\u201334 (2016)","journal-title":"J. Multimed. Inf. Syst. Korea Multimed. Soc."},{"issue":"1","key":"35_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-017-0101-x","volume":"7","author":"J-H Huh","year":"2017","unstructured":"Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1\u201319 (2017). Springer, Berlin, Heidelberg","journal-title":"Hum.-centric Comput. Inf. Sci."}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7605-3_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T00:16:14Z","timestamp":1751156174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7605-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"ISBN":["9789811076046","9789811076053"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7605-3_35","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017,12,20]]}}}