References
- Myung Kil Ahn, Yong Hyun Kim, "Research on System Architecture and Simulation Environment for Cyber Warrior Training," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 533-540, 2016 https://doi.org/10.13089/JKIISC.2016.26.2.533
- B. Ferguson, A. Tall, and D. Olsen, "National Cyber Range Overview," Proceedings of the 2014 IEEE Military Communications Conference, MILCOM '14, pp. 123-128, Oct. 2014
- T. Bonaci and J. Herron and T. YusufTo, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics," National Science Foundation, CNS-1329751, pp. 1-11, May 2015.
- Suyoun Hong, Kwangsoo Kim, Taekyu Kim, "The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training", Journal of the KIMST, Vol. 22, No. 6, pp. 797-805, 2019.
- Soumya Mahalakshmi A., Amulya B. S. and M. Moharir, "A Study of Tools to Develop a Traffic Generator for L4 - L7 Layers," 2016 International Conference on Wireless Communications, Signal Processing and Networking(WiSPNET), Chennai, pp. 114-118, 2016.
- Len Bass, Paul Clements, Rick Kazman, "Software Architecture in Practice," Addison-Wesley Professional, America, 2012.