1 |
MBN, "China develops underwater submarine detection technology" https://www.mk.co.kr/news/world/view/2018/10/613151/, Apr. 2019
|
2 |
ScienceTimes, "GPS jamming" https://www.sciencetimes.co.kr/?news=gps%EC%A0%84%ED%8C%8C-%EA%B5%90%EB%9E%80-%EB%AC%B4%EC%97%87%EC%9D%B4-%EB%AC%B8%EC%A0%9C%EC%9D%BC%EA%B9%8C, Apr. 2019
|
3 |
BASIC, "Hacking UK Trident" https://basicint.org/wp-content/uploads/2018/06/HACKING_UK_TRIDENT.pdf, Apr. 2019
|
4 |
subleague.org, "submarines look so slow when sailing" http://www.subleague.org/xe/sub0307/1220, Apr. 2019
|
5 |
Military & Aerospace Electronics, "Iran-U.S. RQ-170" http://www.militaryaerospace.com/articles/2016/05/unmanned-cyber-warfare.html, May. 2019
|
6 |
ITWorld Korea, "Network Hacking Cases in Korea" http://www.itworld.co.kr/news/102451, May. 2019
|
7 |
etnews, "verified the weapon system SW security" http://www.etnews.com/20180619000155, May. 2019
|
8 |
Sungyong Cha, Seungsoo Baek, Sooyoung Kang and Seungjoo Kim, "Security Evaluation Framework for Military IoT Devices," Security and Communication Networks, Vol. 2018, Article ID 6135845, 12 pages, Jul. 2018
|
9 |
"Risk Management Framework (RMF) for DoD Information Technology (IT)," DoDI 8510.01, Mar. 2014
|
10 |
"Guide for Applying the Risk Management Framework to Federal Information Systems," NIST SP 800-37 Rev.1, Feb. 2010
|
11 |
"Weapon System Development and Management Manual," DAPA(Defense Acquisition Program Administration), Nov. 2018
|
12 |
"National Defense Cyber Security Instruction," Ministry of National Defense No.1862, Dec. 2015
|
13 |
Heejin Jang, Jingoog Kim, Seunghoon Jeong, Heedong Kim and Hyeonsook Kim, "Security Weakness Identification Methodology for Weapon System Software," The Korean Institute of Information Scientists and Engineers, 2017(12), pp. 149-151, Dec. 2017
|
14 |
Yongjun Lee, Joonseon Ahn and Jinyoung Choi, "Research on Improving Security of Software Coding Rule Guide, SCR-G," The Korean Institute of Information Scientists and Engineers, 2018(12), pp. 462-464, Dec. 2018
|
15 |
"National Defense Work Instruction," Ministry of National Defense, No.2040, Jun. 2017
|
16 |
Woncheol Lee, Kanghyun Kim and Seunghyeon Lee, "A Study of Software Security of Embedded Weapon Software Development Lifecycle," The Korean Institute of Information Scientists and Engineers, 2016(12), pp. 92-94, Dec. 2016
|
17 |
Yeonoh Jeong, "A Study about Development Methodology for Ensure the Software Security of Weapon System," The Korean Institute of Information Scientists and Engineers, 2018(6), pp. 77-79, Jun. 2018
DOI
|
18 |
Jiseop Lee, Sungyong Cha, Seungsoo Baek and Seungjoo Kim, "Research for Construction Cybersecurity Test and Evaluation of Weapon System," Journal of The Korea Institute of information Security & Cryptology, 28(3), pp. 765-774, Jun. 2018
DOI
|
19 |
"Guide for Mapping Types of Information and Information Systems to Security Categories," NIST SP 800-60 Rev.1, Aug. 2008
|
20 |
"Security & Privacy Controls for Federal Information Systems and Organizations," NIST SP 800-53 Rev.4, Apr. 2013
|
21 |
"Security Categorization and Control Selection For National Security Systems," CNSSI No. 1253, Mar. 2014
|
22 |
"Cybersecurity Test and Evaluation Guidebook," DoD, Apr. 2018
|