1 |
Myung Kil Ahn, Yong Hyun Kim, "Research on System Architecture and Simulation Environment for Cyber Warrior Training," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 533-540, 2016
DOI
|
2 |
B. Ferguson, A. Tall, and D. Olsen, "National Cyber Range Overview," Proceedings of the 2014 IEEE Military Communications Conference, MILCOM '14, pp. 123-128, Oct. 2014
|
3 |
T. Bonaci and J. Herron and T. YusufTo, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics," National Science Foundation, CNS-1329751, pp. 1-11, May 2015.
|
4 |
Suyoun Hong, Kwangsoo Kim, Taekyu Kim, "The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training", Journal of the KIMST, Vol. 22, No. 6, pp. 797-805, 2019.
|
5 |
Soumya Mahalakshmi A., Amulya B. S. and M. Moharir, "A Study of Tools to Develop a Traffic Generator for L4 - L7 Layers," 2016 International Conference on Wireless Communications, Signal Processing and Networking(WiSPNET), Chennai, pp. 114-118, 2016.
|
6 |
Len Bass, Paul Clements, Rick Kazman, "Software Architecture in Practice," Addison-Wesley Professional, America, 2012.
|