A Study on the Operation Concept of Cyber Warfare Execution Procedures |
Kim, Sung-Joong
(Department of Computer Engineering, Sejong University)
Yoo, JiHoon (Department of Computer Engineering, Sejong University) Oh, HaengRok (Agency for Defense Development) Shin, Dongil (Department of Computer Engineering, Sejong University) Shin, DongKyoo (Department of Computer Engineering, Sejong University) |
1 | Park, Chan-soo and Park, Yongsuk, "A Study on the Improvement of Capability Assessment and the Plan for Enhancing Cyber Warfare Capability of Korea," JKIICE vol. 19, no. 5, pp. 1251-1258, May 2015. https://doi.org/10.6109/jkiice.2015.19.5.1251 |
2 | Kaiser, R., "The Birth of Cyberwar," Political Geography 46,pp.11-20, 2015. https://doi.org/10.1016/j.polgeo.2014.10.001 DOI |
3 | James P. Farewell and Rafal Ronhozinski, "Stuxnet and the Future of Cyber War," Survival 53, no.1, pp.23-40, February-March 2011. http://dx.doi.org/10.1080/00396338.2011.555586 DOI |
4 | Robinson, M., Jones, K., & Janicke, H., "Cyber warfare: Issues and challenges." Computers & security 49, pp.70-94, 2015. https://doi.org/10.1016/j.cose.2014.11.007 DOI |
5 | Secretary of Defense. DoD Publications. http://www.dod.gov/pubs/foi/ojcs/07-F-2105doc1.pdf [accessed 17.08.10]. |
6 | Hildreth, Steven A. "Cyberwarfare." LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE, 2001. |
7 | Jeffrey Carr, Inside Cyber Warfare 2nd edition, Sebastropol, CA : O'Reilly, 2012. |
8 | Colarik, A., & Janczewski, L., "Establishing cyber warfare doctrine," Current and Emerging Trends in Cyber Operations, pp. 37-50, Palgrave Macmillan, London, 2015. http://dx.doi.org/10.5038/1944-0472.5.1.3 |
9 | Lindsay, Jon R. "Stuxnet and the limits of cyber warfare." Security Studies 22.3, pp.365-404, 2013. https://doi.org/10.1080/09636412.2013.816122 DOI |
10 | Hutchins, Eric M., Michael J. Cloppert, and Rohan M. Amin. "Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains." Leading Issues in Information Warfare & Security Research 1.1, 80, 2011. |
11 | Department of Defense, "Cybersecurity Test and Evaluation Guidebook. Version 2.0", 2018. |
12 | Ramon Krikken, Anton Chuvakin. "Selecting Security Monitoring Approaches by Using the Attack Chain Model," Research ID G00264714. Gartner., 2014. |
13 | Hewlett Packard Enterprise. "HPE Attack Life Cycle Use Case Methodology," Technical White Paper, 2016. |
14 | Park, JinHo, et al. "Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE (Measure of Cyber Effectiveness)." Journal of the Korea Institute of Information Security and Cryptology, 29.2, 465-472, 2019. https://doi.org/10.13089/JKIISC.2019.29.2.465 DOI |
15 | Yoo, Jae-won, and Dea-woo Park. "Cyber kill chain strategy for hitting attacker origin." Journal of the Korea Institute of Information and Communication Engineering 21.11, 2199-2205, 2017. https://doi.org/10.6109/jkiice.2017.21.11.2199 DOI |
16 | Department of Defense, "ARCYBER The NEXT Battlefield", 2013.12.10. |
17 | Lionel D. Alford Jr., "Cyber Warfare : A New Doctrine and Taxonomy," The Journal of Defense Software Engineering 14, no.4, pp.27-30, April 2001. |