1 |
Neil Robinson, Agnieszka Walczak, and Sophie-Charlotte Brune, "Stocktaking study of military cyber defence capabilities in the European Union (milCyberCAP)," RAND Corporation, pp.1-22, 2013.
|
2 |
Collaboration with Deloitte, "Risk and Responsibility in a Hyperconnected World: Pathways to Global Cyber Resilience," World Economy Forum, pp.18-20, 2012.
|
3 |
Taylor Roberts, "Cyber Security Capability Maturity Model (CMM)", Global Cyber Securiy Capacity Center University of Oxford, pp.1-44, May, 2015.
|
4 |
U.S. Department of Energy, "Cybersecurity Capability Maturity Model (C2M2)," v1.1, pp.1-76, Feb. 2014.
|
5 |
U.S. Department of Energy, "Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)," v1.1, pp.1-52, Feb. 2014.
|
6 |
Seo, H. J., SoonJa Hong, and Yoon-Cheol Choy. "A Study on the methodology to evaluate the level of nation's capability for cyber war." The 12th International Workshop on Information Security Applications (WISA2011), Aug. 2011.
|
7 |
Jungmin Kang, "A Study on National Cyber Capability Assessment Methodology," Journal of KIISC, vol. 22, no. 5, pp. 1039-1055, 2012.
|
8 |
Booz Allen Hamilton, "Cyber Power Index," Mar. 2011.
|
9 |
KT Economic Management Institute, "Tap On The Door of Mobile First World", pp. 6, Jan. 2015.
|
10 |
KISTEP, "The Analysis of The World Competitiveness 2014 by IMD", vol.11, pp. 7, Mar. 2015.
|
11 |
NIS, "Whitepaper of national Cybersecurity 2015", pp. 275-303, May, 2015.
|
12 |
Pil Woon Jung, "A Critical Analysis on the Concept of Cyber Security," Yonsei Journal of Mediccal and Science Technology Law, vol.2, no.2,, pp.1-25, 2011.
|
13 |
Sunha Bae, Sangdon Park, and So Jeong KIM, "The enhancement Strategy on National Cyber Capability Using Hybrid Methodology of AHP and TOPSIS," Convergence Security Journal, vol.15, no.4, pp.43-55, Jun. 2015.
|
14 |
Paulk, Mark C., Weber, Charles V, Curtis, Bill, Chrissis, Mary Beth "Capability Maturity Model for Software (Version 1.1)," Software, IEEE, vol.10, no.4, pp18-27, Jul. 1993.
DOI
|
15 |
The Heritage Foundation, "2015 Index of U.S. Military Strength", pp.74-78, Feb. 2015.
|
16 |
BSA The software alliance, "EU Cybersecurity Dashboard 2015," pp.1-16, May, 2015.
|
17 |
Pena-Lopez, Ismael. "Global Cybersecurity Index and Cyberwellness profiles Report, " WSIS Forum'15 Geneva, pp.1-37, May, 2015.
|
18 |
Tobias Feakin, Jessica Woodall and Klee Aiken, "Cyber maturity in the Asia-Pacific Region 2014," ASPI, pp.1-76, Apr. 2015.
|
19 |
So Jeong KIM, Seokjin Choi "Study on the National Cybersecurity Strategies of Obama Administraton," Journal of Foreign Affairs and National Security, vol.7, no.2, pp.173-200, 2011.
|
20 |
Taekyu Lee, Corporate Finance based on Business Management, Knowledge and sensiblity, pp.227-228, Feb. 2014.
|
21 |
https://www.nitrd.gov/nitrdgroups/index.php?title=High_Confidence_Software_and_Systems_Coordinating_Group_(HCSS_CG)
|