DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ki J. | ko |
dc.contributor.author | Cheon J.H. | ko |
dc.contributor.author | Kang J.-U. | ko |
dc.contributor.author | Kim D. | ko |
dc.date.accessioned | 2013-03-03T10:14:42Z | - |
dc.date.available | 2013-03-03T10:14:42Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2004 | - |
dc.identifier.citation | ELECTRONIC LIBRARY, v.22, no.1, pp.65 - 73 | - |
dc.identifier.issn | 0264-0473 | - |
dc.identifier.uri | http://hdl.handle.net/10203/78334 | - |
dc.description.abstract | Presents a classification of known attacks in online games and provide security solutions against them. While previous works just presented attacks and solutions case by case, this paper newly classifies attacks by objectives and methods. Moreover, presents attacks in each of four layers: client, server, network, and environment. Through this systematic classification, solutions can be provided more efficiently against even unknown future attacks. | - |
dc.language | English | - |
dc.publisher | EMERALD GROUP PUBLISHING LIMITED | - |
dc.title | Taxonomy of online game security | - |
dc.type | Article | - |
dc.identifier.wosid | 000220347300008 | - |
dc.identifier.scopusid | 2-s2.0-1542333606 | - |
dc.type.rims | ART | - |
dc.citation.volume | 22 | - |
dc.citation.issue | 1 | - |
dc.citation.beginningpage | 65 | - |
dc.citation.endingpage | 73 | - |
dc.citation.publicationname | ELECTRONIC LIBRARY | - |
dc.identifier.doi | 10.1108/02640470410520122 | - |
dc.contributor.localauthor | Kang J.-U. | - |
dc.contributor.nonIdAuthor | Ki J. | - |
dc.contributor.nonIdAuthor | Cheon J.H. | - |
dc.contributor.nonIdAuthor | Kim D. | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Computer software | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Network operating systems | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.