과제정보
This work was supported by the research grant of the Kongju National University in 2023.
참고문헌
- CVE Details. "Vulnerabilities By Types/Categories". https://www.cvedetails.com/vulnerabilities-by-types.php.
- National Institute of Standards and Technology (NIST). Security and Privacy Controls for Information Systems and Organizations: NIST Special Publication 800-53, Revision 5. Gaithersburg, MD: National Institute of Standards and Technology, September 2020. DOI: 10.6028/NIST.SP.800-53r5.
- H. Na and H. Jung. "A Theoretical Comparative Study of Human Resource Security Based on Korean and Int'l Information Security Management Systems." Journal of Convergence for Information Technology, Vol. 6, No. 3, pp. 13?19, September 2016. DOI: 10.22156/CS4SMB.2016.6.3.013.
- S. Kim. "A Comparative Study on Information Security Management Activity of Public Sector in USA & Korea." The KIPS Transactions: Part C, Vol. 13C, No. 1, pp. 69?74, February 2006. DOI: 10.3745/KIPSTC.2006.13C.1.069.
- "Control Correlation Identifier(CCI) Process," version 1 release 0.1, pp. 1-5, February 2011. https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/u_cci_process_v1r0.1.pdf.
- "Control Correlation Identifier," DoD Cyber Exchange Public. https://public.cyber.mil/stigs/cci/.\
- National Institute of Standards and Technology. "Control Correlation Identifier (CCI)." NIST Computer Security Resource Center. https://csrc.nist.gov/glossary/term/CCI.
- Security Requirements Guide. NIST Computer Security Resource Center. https://csrc.nist.gov/glossary/term/security_requirements_guide.
- Efense Information Systems Agency. "Security Technical Implementation Guides (STIGs)." DoD Cyber Exchange. https://public.cyber.mil/stigs/.
- MITRE Corporation. "CVE Numbering Authorities (CNAs)." CVE Program. https://cve.mitre.org/cve/cna.html.
- ational Institute of Standards and Technology. OVAL Language Specification, Version 5.11.3. MITRE Corporation, 2020. https://oval.mitre.org/language/about/specification.html.
- Hamdani, S. W. "Framework for Assessing Information System Security Posture Risks." Master's thesis, The University of Western Ontario, June 2023.
- Branescu, I., Grigorescu, O., and Dascalu, M. "Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics." Information, Vol. 15, No. 4, pp. 214, 2024. DOI: 10.3390/info15040214.
- Haddad, A., Aaraj, N., Nakov, P., and Mare, S. F. "Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses." arXiv, April 2023. https://arxiv.org/abs/2304.11130.
- Red Hat, Inc. "OVAL Repository." https://access.redhat.com/security/data/oval/.
- Canonical Ltd. "Ubuntu OVAL Data." Ubuntu Security. https://ubuntu.com/security/oval.
- National Institute of Standards and Technology. "National Checklist Program Repository." NIST. https://nvd.nist.gov/ncp/repository.
- Cui, Y, Jia, M.l Lin, T, Song, Y. and Belongie, S. "Class-Balanced Loss Based on Effective Number of Samples." arXiv preprint arXiv:1901.05555, 2019. https://ar5iv.labs.arxiv.org/html/1901.05555.