1 |
Y.-T. Cha, B.-H. Cho, and J.-C. Na, "Security Technology Trends and Prospective of Industrial Control System,". KEIT PD Issue Report, vol. 13-6, 2013, pp. 79-100.
|
2 |
N. Falliere, L. O. Murchu, and E. Chien, "Win32.stuxnet Dossier," Symantec Security Response, 2011.
|
3 |
A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA Security in the light of Cyber- Warfare," Computer & Security, 2012, pp. 418-436.
|
4 |
Y.-H. Chen, "Introduction of Information Security for Industrial Control System," Korea Institute of Information Security and Cryptology, vol. 19, no. 5, 2009, pp. 52-59.
|
5 |
NRC Information Notice 2003-14, "Potential Vulnerability of Plant Computer Network to Worm Infection," Nuclear Regulatory Commission, 2003.
|
6 |
Y.-H. Chen, "Network Design and Architecture for ICS Security", Korea Institute of Information Security and Cryptology, vol. 19, no. 5 2009, pp. 60-67.
|
7 |
NIST SP800-53, "Recommended Security Controls for Federal Information System," National Institute of Standards and Technology, 2009.
|
8 |
NIST SP800-82, "Guide to Industrial Control System Security," National Institute of Standards and Technology, 2011.
|
9 |
W.-S. Seo and M.-S. Jun, "A Direction of Convergence and Security of Smart Grid and Information Communication Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 5, 2010, pp. 477-486.
과학기술학회마을
|
10 |
I.-S. Koo, K.-W. Kim, S.-B. Hong, G.-O. Park, and J.-Y. Park, "Digital Asset Analysis Methodology against Cyber Threat to I&C System in NPP," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 6, 2011, pp. 839-847.
|
11 |
C.-H. Yoon, G.-J. Kim, and C.-S. Jang, "Embedded-based Power Monitoring Security Module Design," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 10, 2013, pp. 1485-1490.
과학기술학회마을
DOI
ScienceOn
|