1 |
Department of Defense. Cyber Strategy. [Internet]. Available : https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF. 2018.
|
2 |
E. M. Hutchins, L. Martin, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains," 2011.
|
3 |
J. W. Yoo, and D. W. Park, "Cyber kill chain strategy for hitting attacker origin," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 11, pp. 3, Nov. 2017.
|
4 |
Department of Defense. (2015). Cybersecurity Test and Evaluation Guidebook. Version 1.0, 2015.
|
5 |
U.S. Joint Chief of Staff. Cyberspace Operations. (JP 3-12). 2018.
|
6 |
U.S. ARMY, CYBER OPERATIONS OFFICER, CAREERS & JOBS [Internet]. Available : https://www.goarmy.com/careers-and-jobs/browse-career-and-job-categories/computers-and-technology/cyber-operations-officer.html. 2017.
|
7 |
Headquaters, Department of the Army. Cyberspace and Electronic Warfare Operations (FM 3-12) [Internet]. Available : https://fas.org/irp/doddir/army/fm3-12.pdf. 2017.
|
8 |
U.S. Army. Operations. (FM 3-0). 2017.
|