1 |
고장혁, 이동호, "네트워크 트래픽 수집 및 복원을 통한 내부자 행위 분석 프레임워크 연구," 디지털산업정보학회 논문지, 제13권 제4호, 2017a, pp.125-139.
|
2 |
고장혁, 이동호, "정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구," 디지털산업정보학회 논문지, 제13권 제2호, 2017b, pp.1-11.
|
3 |
고장혁, 이동호, "국방정보시스템 성능향상을 위한 효율적인 GPU 적용방안 연구," 디지털산업정보학회 논문지, 제11권 제1호, 2015, pp.27-35.
|
4 |
N. Nakhla, K. Perrett and C. McKenzie, "Automated computer network defence using ARMOUR: Mission-oriented decision support and vulnerability mitigation," 2017 International Conference On Cyber Situational Awareness, Data Analytics and Assessment(Cyber SA), Lodon, 2017, pp.1-8.
|
5 |
Barik, M.ridul & Sengupta, Anirban & Mazumdar, Chandan, "Attack Graph Generation and Analysis Techniques," Defence Science Journal. Vol, 66, No.6, 2016, pp.559-567.
DOI
|
6 |
R. Lippmann et al., "Validating and Restoring Defense in Depth Using Attack Graphs," MILCOM 2006, IEEE Military Communications conference, Washington, DC, 2006, pp. 1-10.
|
7 |
K. Ingols, M. Chu, R. Lippmann, S. Webster and S. Boyer, "Modeling Modern Network Attacks and Countermeasures Using Attack Graphs," 2009 Annual Computer Security Applications Conference, Honolulu, HI, 2009, pp. 117-126.
|
8 |
S. Noel, M. Elder, S. Jajodia, P. Kalapa, S. O'Hare and K. Prole, "Advances in Topological Vulnerability Analysis," 2009 Cybersecurity Applications & Technology Conference for Homeland Security, Washington, DC, 2009, pp. 124-129.
|
9 |
Jajodia S., Noel S. (2010) Topological Vulnerability Analysis. In: Jajodia S., Liu P., Swarup V., Wang C. (eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, Boston, MA
|
10 |
A Singhal, X Ou, "Security risk analysis of enterprise networks using probabilistic attack graphs," Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011, http://purl.fdlp.gov/GPO/gpo28803.
|