References
- 이광호, 김흥택. "사이버 안보를 위한 軍정보보호 전문인력 양성방안", 융합보안논문지, 제17권 제2호, pp.145-152, 2017.
- L.A. Zadeh, "Fuzzy Set", Information and Control 8. pp.338-353, 1965. https://doi.org/10.1016/S0019-9958(65)90241-X
- L.A. Zadeh, "The Concept of a Linguistic Variable and its Application to Approximate Reasoning", Information Science 8. pp.199-249, 1975 https://doi.org/10.1016/0020-0255(75)90036-5
- Burrough & R.A. McDonnel, "Principle of Geographical Information System, Oxford University Press, 1998.
- 김애찬, 이동훈, "효과적인 사이버위협 정보공유체계 수립을 위한 요구사항의 우선순위 도출에 관한 연구", 정보보호학회지 제26권 제1호, pp.61-67, 2016.
- 이태규, '군사용어사전', 일월서각, 2012
- 국방기술품질원, '군방과학기술용어사전', 2011
- 윤석준, 김종화, "사이버 작전 수행을 위한 사이버 작전 모델 제안", 합참지 Vol.74 2018.1월(겨울호), pp.55-60, 2018.
- Enter Greg Reith, "Prioritizing Cyber Threats With Real-Time Threat Intelligence", RFSID., 2018.
- Libicki Martin C, "Conquest in Cyberspace : National Security and Information Warfare." Cambridge University Press, 2007
- Irving Lachow, "Cyberpower and National Security", Potomac Books Inc., 2009
- Jong Min Yun, Sung-Sam Hong and Myung-Mook han, "The Study of Threat Evaluation using Threat Evaluation Parameter and Fuzzy on Air Defence of Army", Proceedings of KIIS Fall conference, vol. 21 no.2 pp.228-229, 2011
- 최보민, 한명묵, "베이지안 네트워크 학습을 이용한 방공 무기 체계에서의 위협평가기법 연구", Journal of Korean Institute of Intelligent Systems, Vol 22 No. 6 pp.715-721, 2012 https://doi.org/10.5391/JKIIS.2012.22.6.715
- 도용태, 김일곤 외 3명 '인공지능 개념 및 응용', 사이텍미디어, 2013.
- Ming-Chang, Lee. "Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method", International Journal of Computer Science & Information Technology (IJCSIT) 6 (1) p. 29-45., 2014 https://doi.org/10.5121/ijcsit.2014.6103
- Sjoberg, Lennart., "Consequences of perceived risk: Demand for mitigation." Journal of Risk Research 2.2., 1999
- National Research Council of the National Academies., "The Owner's Role in Project Risk Management". Available in:(https://www.nap.edu/read/11183/chapter/7). p. 41., 2005
- Hany, Sallam. "Cyber Security Risk Assessment Using Multi Fuzzy Inference System", International Journal of Engineering and Innovative Technology (IJEIT) 4, 8., 2015
- Martin McNeill, F., Ellen, Thro. "FUZZY LOGIC A PRACTICAL APPROACH" by Academic Press Professional. San Diego, CA, USA., 1994
- Bajpai, Shailendra, et al. "Security Risk Assessment: Applying the Concepts of Fuzzy Logic", Journal of Hazardous Materials, 173 (1-3) 258-264., 2010 https://doi.org/10.1016/j.jhazmat.2009.08.078
- Sonia., Singhal, A., Banati, H. "Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework using DREAD model", IJCSI International Journal of Computer Science Issues, 8 (4) 1., 2011
- H. -J. Zimmermann "Fuzzy set theory', 2015