1 |
Myung Kil Ahn, Yong Hyun Kim, "Research on System Architecture and Simulation Environment for Cyber Warrior Training," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 533-540, 2016.
DOI
|
2 |
B. Ferguson, A. Tall, and D. Olsen, "National Cyber Range Overview," Proceedings of the 2014 IEEE Military Communications Conference, MILCOM '14, pp. 123-128, Oct. 2014.
|
3 |
T. Bonaci and J. Herron and T. YusufTo, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics," National Science Foundation, CNS-1329751, pp. 1-11, May 2015.
|
4 |
SHIVAYOGIMATH, Chaitra N., "An Overview of Network Penetration Testing," International Journal of Research in Engineering and Technology, Vol. 3, No. 3, pp. 408-413, 2014.
|
5 |
Rossey, L. M., Cunningham, R. K., Fried, D. J., Rabek, J. C., Lippmann, R. P., Haines, J. W., & Zissman, M. A. "Lariat: Lincoln Adaptable Real-Time Information Assurance Testbed," In Proceedings, IEEE Aerospace Conference Vol. 6, pp. 6-6, March, 2002.
|
6 |
Applebaum, A., Miller, D., Strom, B., Korban, C., & Wolf, R. "Intelligent, Automated Red Team Emulation," In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACM, pp. 363-373, December, 2016.
|
7 |
Strom, B. E., Applebaum, A., Miller, D. P., Nickels, K. C., Pennington, A. G., & Thomas, C. B., "MITRE : Design and Philosophy," Technical Report, 2018.
|
8 |
Len Bass, Paul Clements, Rick Kazman, "Software Architecture in Practice," Addison-Wesley Professional, America, 2012.
|
9 |
Lloyd Wihl, "Training for the Combined Cyber / Kinetic Battlefield," In Proceedings of MODSIM World 2015. No. 9, pp. 1-11, March, 2015.
|