1 |
Wansoo Cho, Taekyu Kim, "Modeling and Simulation of Cyber Damage Assessment for Cyber Warfare Effectiveness Analysis", JKIIE-S'16, pp. 3119-3125, Apr. 2016.
|
2 |
Duhoe Kim, Yonghyun, Kim, Dongkyoo Shin, "Cyber Battle Damage Assessment Framework", KIPS-F'17, pp. 178-181, Nov. 2017.
|
3 |
SeungKeun Yoo, "Comprehensive Approach to Evaluate the Damage of Cyberattack on the Defense Mission System", KSS-F'18, pp. 1-11, Dec. 2018.
|
4 |
Kihwan Kim, Wanju Kim, "A Study on Simulation-Based Worm Damage Assessment on ATCIS", Journal of the Korea Institute of Military Science and Technology 11(1), pp. 43-50, 2007.
|
5 |
Youngbae Jeon, Hyunsook Jeong, Insung Han, "An Asset-Mission Dependency Model Adaptation and Optimized Implementation for Efficient Cyber Mission Impact Assessment", KIISE Transactions on Computing Practices 23(10), pp. 579-587, 2017.
DOI
|
6 |
Jungho Kang, "Effective Cyber Operation Combat Damage Evaluation Model Design through Tactical Network Integrated Operation", Journal of Security Engineering 14(1), pp. 1-8, 2017.
DOI
|
7 |
Sunyoung Im, Hyunsook Jeong, "Damage Assessment for Cyber Assets", KICS-S'18, pp. 310-311, Jun. 2018.
|
8 |
Joint Staff, CJCSI 3162.02: Methodology for Combat Assessment, Joint Staff, Washington D.C., pp. B-1 B-5, 2019.
|
9 |
AhnLab, "AhnLabSabo Security World", https://blogsabo.ahnlab.com/743, 2019.12.1
|
10 |
Wongu Jang, "Bigdata Governance Model for Effective Operation in Cyberspace", The Korea Journal of Bigdata 4(1), pp. 47, 2019.
DOI
|
11 |
Joint Staff, Joint Publication 3-0: Joint Operations, Joint Staff, Washington D.C., pp. IV-4. 2018.
|
12 |
Hyeonsu Youn, Yonghyun Kim, Donghwa Kim, Dongkyu Shin. "Development of Risk Index of Cyber Attack and Damage Assessment Priority Calculation Measures", KIPS-F'17, pp. 224-227, Nov. 2017.
|
13 |
Worlsu Jang, "A Study on a Model for Estimating Damage Costs Emanating from Leakage in Military Secrets", Ph.D. Thesis, Korea University, pp. 37. Aug. 2012.
|
14 |
"67 cyberattacks from 6.25 Cyberterror...14 information destruction", joongan gilbo, 2013. 7. 4, https://news.joins.com/article/11981111
|
15 |
"7.7 DDoS, 6.25 Cyberterror, KHNP Hacking Psychological Warfare...Over and over again cyberattacks", etnews, 2017. 2. 21, http://www.etnews.com/20170221000305
|
16 |
Red Alert, "6.25 Cyber terror analysis report", NSHC, 2013.
|