1 |
Shin, H.G. and Eom, J.H., "Establishment of Cyber Security Strategy according to the change of cyberspace environment," Journal of Security Engineering, Vol.14, No.4, 2017, pp.251-262.
DOI
|
2 |
Kim, S.G., Cheon, S.P., and Eom, J.H., "A leading cyber warfare strategy according to the evo-lution of cyber technology after the fourth industrial revolution," International Journal of Advanced Computer Research, Vol 9(40), 2018, pp.72-80.
DOI
|
3 |
Hur, C.H., Kim, S.P., Kim Y.S., and Eom, J.H., "Changes of Cyber-Attacks Techniques and Patterns after the Fourth Industrial Revolution," The 5th International Conference on Future Inter-net of Things and Cloud Workshops 2017, pp.69-74.
|
4 |
Eom, J.H., "Modeling of Cyber Attack Intentions Analysis reflecting Domestic / International Situations," International Journal of Grid and Distributed Computing Vol.11, No.1, 2018, pp.13-16.
DOI
|
5 |
Eom, J.H, Kim, N.U., and Chung, T.M., Introduction on cyber war in the 4th industrial revolution era, Hongneung, Seoul, 2020, p.81-94.
|
6 |
Lee, D.S, "The Trends of Next Generation Cyber Security Technology," Weekly Technology Trends, No.1916, 2019, pp.2-15.
|
7 |
Kook, K.H. and Kong, B.C., "The Trend of Security technology development using artificial intelligence," Weekly Technology Trends, No.1913, 2019, pp.2-15.
|
8 |
ETRI, Promotes network self-defense technology development, http://www.koit.co.kr/news/articleView.html?idxno=68307
|
9 |
Chang, N.S., "Cybersecurity Threats, Counter Strategies and South Korea's Cyber Strategy," Journal of National Security and Strategy Vo.19, No.2, 2019, pp.1-33.
|
10 |
Kim, K.S. and Shin, J.H., "Concept of operating unmanned ground combat system according to the aspect of future war," Defense & Technology, No.479, 2019, pp.62-75.
|
11 |
Herbert C. Kemp., "Left of Launch: Countering Theater Ballistic Missiles," Atlantic Council, Washington, 2017.
|
12 |
Scott D. Applegate., "the principle of maneuver in cyber operations," the 4th International Conference on Cyber Conflict 2012, IEEE, 2012, pp.1-13.
|
13 |
7 cyber attacks in 2020, https://www.boho.or.kr/data/reportView.do?bulletin_writing_sequence=35227
|
14 |
Kim, N.U. and Eom, J.H., "Attack Path and Intention Recognition System for detecting APT Attack," Journal of the Korea Society of Digital Industry and Information Management, Vol.16, No.1, 2020, pp.69-80.
|
15 |
Eom, J.H., Park, S.H., and Chung, T.M., "A Study on an Extended Cyber Attack Tree for an Analysis of Network Vulnerability," Journal of the Korea Society of Digital Industry and Information Management, Vol.6, No.3, 2010, pp.49-57.
DOI
|