1 |
ICS-CERT, http://ics-cert.us-cert.gov/alerts/ICS-ALERT-12-020-02A,
|
2 |
ICS-CERT, http://ics-cert.us-cert.gov/alerts/ICS-ALERT-12-019-01A
|
3 |
ICS-CERT, http://ics-cert.us-cert.gov/advisories/ICSA-12-320-01
|
4 |
Nicolas Falliere, Liam O Murchu, Eric Chien, "W32.Stuxnet Dossier v1.3", Symantec Security Response, November, 2010
|
5 |
SHINE, http://www.icscybersecurityconference.com/session/project-shine-update/
|
6 |
ICS-CERT, http://ics-cert.us-cert.gov
|
7 |
BaseCamp Project, http://www.digitalbond.com/tools/basecamp/
|
8 |
G. Morten, Creating a Weapon of Mass Disruption: Attacking Programmable Logic Controllers, Master Thesis, 2013
|
9 |
Frank Swiderski and Window Snnyder. Threat modeling. O'Reilly Media, Inc., 2009
|
10 |
미래창조과학부, 주요정보통신기반시설 취약점 분석.평가 기준, 미래창조과학부고시 제2013-37호 주요정보통신기반시설 취약점 분석.평가 기준
|
11 |
Department of Homeland Security, Common Cybersecurity Vulnerabilities in Industrial Control Systems", May 2011
|