참고문헌
- J. Cho and K. Jeong, "Remote Controlled Robots Used for the Mitigation of the Fukushima Nuclear Power Plant Accident," J. of Institute of Control, Robotics and Systems, vol. 2011, no. 12, 2011, pp. 148-151.
- X. Hao and C. Kim, "Design and Implementation of a Smart Home Cloud Control System Using Bridge based on IoT," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 5, 2017, pp. 865-872. https://doi.org/10.13067/JKIECS.2017.12.5.865
- H. Ko and H. Kim, "A Study on Vulnerability Analysis and Incident Response Methodology based on the Penetration Test of the Power Plant's Main Control Systems," J. of the Korea Institute of Information Security and Cryptology, vol. 24, no. 2, 2014, pp. 295-310. https://doi.org/10.13089/JKIISC.2014.24.2.295
- S. Park, W. Choi, B. Chung, J. N. Kim, and J. M. Kim, "The Study on the Cyber Security Requirements of Cyber-Physical Systems for Cyber Security Frameworks," J. of Institute of Embedded Engineering of Korea, vol. 7, no. 5, 2012, pp. 255-265.
- T. H. Cormen, Algorithms Unlocked. London: MIT Press, 2013.
- Y. Jang, "Analysis of Concentration-Related EEG Component Due to SmartPhone," J. of the KIECS, vol. 11, no. 7, 2016, pp. 712-722.
- Y. Shin and J. Ryu, "Study on Adoption of Suitable Encryption Scheme According to Data Properties on MySQL Database," Proc. Korea Computer Congress 2010, Jeju island, South Korea, June, 2010.
- R. D. Silverman, "A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths," Bulletin of RSA Laboratories, no. 13, April, 2000.
- B. S. Dhillon, Engineering Safety. Singapore: World Scientific, 2003.
- C. Kong and L. Semyeong, "A Study of Inverse Modeling from Micro Gas Turbine Experimental Test Data," J. of Korean Society of Propulsion Engineers, vol. 13, no. 6, 2009, pp. 1-7.
- A. Selby and C. Mitchel, "Algorithms for Software Implementations of RSA," IEE Proc. E - Computer and Digital Techniques, vol. 136, no. 3, 1989, pp. 166-170. https://doi.org/10.1049/ip-e.1989.0023
- T. Fujita, K. Kogiso, K. Sawada, and S. Shin, "Security Enhancement of Networked Control Systems Using RSA Public-key Cryptosystem," Proc. 10th Asian Control Conf., Kota Kinabalu, Malaysia, May, 2015.