1 |
G. I. Jeong, J. K. Lee, and G. O. Park, "Application Trend of Cyber Security in Nuclear Power Plant Measurement Control System," Journal of the Korea Information Processing Society Review, vol. 19, no. 5, pp. 69-77, Sept. 2012.
|
2 |
S. S. Kang, T. H. Lim, J. Y. Choo, H. T. Kim, D. H. Kim, G. G. Byun, J. E. Park, J. Y. Lee, and H. S. Choo, "Analysis on the EMC evaluating method for applying wireless communications in NPP," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 12, pp. 2221-2231, Dec. 2017.
DOI
|
3 |
D. Kim, "Vulnerability Analysis for Industrial Control System Cyber Security," Journal of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 1, pp. 137-142, Jan. 2013.
DOI
|
4 |
S. H. Kim, S. C. Lim and D. Y. Kim, "Regulatory Requirements Analysis for Development of Nuclear Power Plants Cyber Security Vulnerability Inspection Tool," Journal of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 5, pp. 725-730, Oct. 2017.
DOI
|
5 |
D. Y. Kim, "Security Criteria for Design and Evaluation of Secure Plant Data Network on Nuclear Power Plants," Journal of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, pp. 267-271, Feb. 2014.
DOI
|
6 |
D. Y. Kim, "Cyber security issues imposed on nuclear power plants," Annals of Nuclear Energy, vol. 65, pp. 141-143, Nov. 2014.
DOI
|
7 |
The Government of the Hong Kong Special Administrative Region [Internet]. Available: https://www.infosec.gov.hk/english/technical/files/vulnerability.pdf.
|
8 |
P. Lindstrom, (2004, July). Network VS. Host-based Vulnerability Management. A Spire Research Report [Internet]. Available : http://spiresecurity.com/?page_id=1307.
|
9 |
K. Scarfone, S. Murugiah, C. Amanda, and O. Angela, "Technical guide to information security testing and assessment." NIST Special Publication 800, no. 115, pp. 2-25, Sept. 2008.
|
10 |
High-Tech Bridge Web Security Company [Internet]. Available: https://www.htbridge.com/immuniweb/.
|
11 |
Netsparker Web Application Security Scanner [Internet]. Available: https://www.netsparker.com/.
|
12 |
Tenable - Nessus [Internet]. Available: https://www.tenable.com/.
|
13 |
OpenVAS [Internet]. Available: http://www.openvas.org/.
|
14 |
BeyondTrust -Retina CS Community [Internet]. Available: https://www.beyondtrust.com/products/retina-network-community/.
|
15 |
Microsoft - MBSA [Internet]. Available: https://www.microsoft.com/en-us/download/details.aspx?id=7558.
|
16 |
US Nuclear Regulatory Commission, "Syber Security Programs for Nuclear Power Facilities," Nuclear Regulatory Commission Regulatory Guide 5.71, Jan. 2010.
|
17 |
IBM QRadar [Internet]. Available : https://www.ibm.com/security/security-intelligence/qradar.
|