참고문헌
- ISO/IEC TS 27100 - Information technology - Security techniques - Cybersecurity - Overview and concepts, https://www.iso27001security.com/html/27100.html. (Accessed: March 01, 2020)
- ISO/IEC TS 27101 - Information Security, Cybersecurity and Privacy Protection - Cybersecurity framework development guidelines, https://www.iso27001security.com/html/27101.html. (Accessed: March 01, 2020)
- ISO/IEC TR 27103:2018 - Information technology - Security techniques - Cybersecurity and ISO and IEC standards, https://www.iso27001security.com/html/27103.html. (Accessed: March 01, 2020)
- "Framework for Improving Critical Infrastructure Cybersecurity", National Institute of Standards and Technology, (2018).
- "ENISA Threat Landscape Report 2018", European Union Agency For Network And Information Security, pp. 24-115, (2019).
- "ENISA Threat Taxonomy", European Union Agency For Network And Information Security, (2016).
- "Cyber security for Smart Cities - An architecture model for public transport", European Union Agency For Network And Information Security, (2015).
- "Smart Hospitals - Security and Resilience for Smart Health Service and Infrastructures", European Union Agency For Network And Information Security, (2016).
- 2019 National Information Protection White Paper, Available From: https://www.kisa.or.kr/public/library/etc_View.jsp?regno=0012001&searchType=&searchKeyword=&pageIndex=1. (Accessed: March 01, 2020)
- "Survey for Information Security Industry in Korea : Year 2019", Korea Information Security Industry Association, (2019).
- Smart Medical, https://www.kisa.or.kr/public/laws/laws3.jsp. (Accessed: March 01, 2020)
- E. D, Hwang, and Y. W. Lee, "User Authentication of a Smart City Management System", Journal of the Korea Convergence Society, vol. 10, no. 1, pp. 53-59, (2019). https://doi.org/10.15207/JKCS.2019.10.1.053
- E. D, Hwang, and Y. W. Lee, "Smart City Security Management in Three Tier Smart City Management System", Journal of the Korea Convergence Society, vol. 10, no. 1, pp. 25-33, (2019). https://doi.org/10.15207/JKCS.2019.10.1.025
- Korean Ministry of Land, Infrastructure and Transport, Act on Smart City Creation and Industry Promotion, etc, This Decree enter into force on Sept. 22, 2017. Law No.14718.
- Korean Ministry of Land, Transport and Maritime Affairs(Ministry of land, transport and maritime affairs), Korea, ACT ON THE CONSTRUCTION, ETC. OF UBUQUITOUS CITIES, amended by Act No. 9705, May 22, (2009).
- H. S. Jung, C. S. Jeong, Y. W. LEE and P. D. Hong, "An Intelligent Ubiquitous Middleware for U-city: SmartUM", Journal of Information Science and Engineering, vol. 25, no. 2, pp. 375-388, (2009).
- Threat Classification Taxonomy Cross Reference View, http://projects.webappsec.org/w/page/13246977/Threat%20Classification%20Views. (Accessed: March 01, 2020)
- Taxonomy Model for Cyber Threat Intelligence Information Exchange Technologies, https://s2erc.georgetown.edu/sites/s2erc/files/CyberISE%20Taxonomy.pdf. (Accessed: July 01, 2016)
- Two taxonomies of deception for attacks on information systems, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.457.5398&rep=rep1&type=pdf. (Accessed: March 01, 2020)
- CIF Taxonomy Assesment v1", https://code.google.com/p/collective-intelligence-framework/wiki/TaxonomyAssessment_v1. (Accessed: July 01, 2016)
- HP Tipping Point Event Taxonomy V 2.2, http://h10032.www1.hp.com/ctg/Manual/c03964615. (Accessed: July 01, 2016)
- A Taxonomy of Operational Cyber Security Risks, http://resources.sei.cmu.edu/library/assetview.cfm?assetID=9395. (Accessed: March 01, 2020)
- H. H. Kim, et al., " Development of CAN network intrusion detection algorithm to prevent external hacking", The Korean Society of Industry Convergence, vol. 20, no. 2, pp. 177-186 (2017).