References
- Bae, C. S. and Goh, S. C. (2019). Case Study on Security Enhancement of Smart Factory, Korea Institute of Information Security & Cryptology, 29(3), 675-684.
- Choi, G. B. (2012). Status of Defense Cyber Response According to National Cyber Threats, Journal of Korea Institute of Information Security & Cryptology, 22(8), 36-40.
- Hwang, I. H. (2021). The Influence of Security Motivation and Organization Trust on Information Security Compliance : Focusing on Moderation Effects of Work Promotion Focus, Journal of Korea Society of Industrial Information Systems, 26(3). 23-39.
- Jeon, G. H. and Kim, K. S. (2024). Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment, Journal of Platform Technology, 12(1), 91-105.
- Jin, J. H. and Kim, J. T. (2021). A Study on the Security Enhancement of the Industrial Control System through the Application of IEC62443 Standards, Journal of Korea Information Processing Society, 28(2), 280-283.
- Kang, D. Y. (2021). Analysis of Threat Information Priorities for Effective Security Monitoring & Control, Journal of Korea Society of Industrial Information Systems, 26(5), 69-77.
- Kim, D. I. (2015). Aphased Strategy for Application of the Risk Management System based on ISO 31000 in the Domestic Construction Companies, Dissertation, Graduate School of Korea University, Seoul, Korea.
- Kim, E. J. and Park, I. C. (2023). The Impact of SMEs' Security Activities on Cyber Incident Response. Korean Journal of Industry Security, 13(1), 7-28.
- Kim, E. Y. (2015). Cyber Security Risk Analysis and Response Strategy Research in Smart Factories, Journal of Information Security Society, 25(1), 89-97.
- Kim, G. Y. (2018). Dependent Attacks Anaylsis for Threat Analysis and Risk Assessment (TARA), Thesis, Graduate School of Hanyang University, Seoul, Korea.
- Kim, H. J., Kim, S. J., Kim, Y. S., Kim, S. K. and Shon, T. H. (2019). Cybersecurity Architecture for Reliable Smart Factory, J ournal of The Korea Institute of Information Security & Cryptololgy, 29(3), 629-643.
- Kim, Y. S. and Park, J. H. (2022). A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan, The Korean Institute of Chemical Engineers, 60(4), 492-498.
- Kim, W. N. and Park, E. K. (2019). Current Control System Security Evaluation System Trend, Journal of Information Security, 29(2), 5-11.
- Lee, H. S. (2015). Research on Smart Factory Security Threat Response Measures, Journal of Information Security Society, 25(4), 305-313.
- Lee, J. M. (2018). Security Vulnerability Management in Industrial Control System (ICS) Environment and Its Limitations; Focus on Security Patching, Thesis, Graduate School of Korea University, Seoul, Korea.
- Min, B. G. (2014). Vulnerability Analysis Plan According to Changes in Cybersecurity Threats, Korea Institute of Information Security & Cryptology, 24(1), 7-12.
- Shin, Y. S. (2024). A Study on the Establishment of Security Areas and Guidelines for Small and Medium Manufacturing Enterprises in the DX Process Environment, Journal of Industrial Technology Research, 29(2), 29-37.
- Son, B. J. (2023). Trend Analysis on Cybersecurity in the Era of Digital Transformation: Policy Implications, Dissertation, Graduate School of Seoul Venture University, Seoul, Korea.
- You, K. S. (2019). Smart Factory Information Security Policy Directional Suggestions, Thesis, Graduate School of Ajou University, Suwon, Korea.