1 |
N. Falliere, L. O. Murchu, and E. Chien, Win32.stuxnet Dossier. Symantec Security Response, 2011.
|
2 |
Y. Choi, Y. Choi, J. Lee, C. Wan, I. Koo, and S. Hong "Study on the Construction of Cyber Security for the Nuclear Power Plants," Fall Conf. from Korea Society of IT Services, 2009, pp. 537-538.
과학기술학회마을
|
3 |
Y. Cha, B. Cho, and J. Na, "Security Technology Trends and Prospective of Industrial Control System," KEIT PD Issue Report, vol. 13, no. 6, 2013, pp. 79-100.
|
4 |
NRC Information Notice 2003-14, Potential Vulnerability of Plant Computer Network to Worm Infection. Nuclear Regulatory Commission, 2003.
|
5 |
NRC Information Notice 2007-15, Effects of Ethenet based, no-safety related controls on the safe and continued operation of nuclear power stations. Nuclear Regulatory Commission, 2007.
|
6 |
W. Seo and M. Jun, "A Direction of Convergence and Security of Smart Grid and Information Communication Network," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 5, 2010, pp. 477-486.
과학기술학회마을
|
7 |
I. Koo, K. Kim, S. Hong, G. Park, and J. Park, "Digital Asset Analysis Methodology against Cyber Threat to I&C System in NPP," J. of the Korea Institute of Electronic Communication Sciences, vol. 6, no. 6, 2011, pp. 839-847.
과학기술학회마을
|
8 |
C. Yoon, G. Kim, and C. Jang, "Embedded-based Power Monitoring Security Module Design," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 10, 2013, pp. 1485-1490.
과학기술학회마을
DOI
ScienceOn
|
9 |
C. K. Veitch, S. Wade, and J. T. Michalski, Cyber Security Assessment Tools and Methodologies for the Evaluation of Secure Network Design at Nuclear Power Plants. Sandia National Laboratories, 2012.
|
10 |
NRC NUREG/CR-7117, Secure Network Design. Nuclear Regulatory Commission, 2012.
|
11 |
J. T. Michalski, F. J. Wyant, and D. Duggan, Secure Network Design Techniques for Safety System Applications at Nuclear Power Plants. Sandia National Laboratories, 2010.
|