1 |
Hwi Rak Park, North Korea Nuclear Threat and Action, 2013
|
2 |
Jin Seok Kang, Losig and Philosophy of Modern warfare, 2012
|
3 |
Jin Seok Kang, Clausewitz and Korea, Arms and Gown, 2013
|
4 |
Kil Hyun Nam, Cyber Terror, National Security, 2002
|
5 |
Security Engineering thesis, 2013
|
6 |
No Hoon, Je Wook Lee, Emergence of Cyber Warfare, Effect and Direction of reaction, 2001
|
7 |
Sang Ho Lee, Utility of Cyber, information Warfare in Military Strategy, 2010
|
8 |
The Headquarter of the Army, Field Manual, Cyber Warfare, 2002
|
9 |
Ecward Watz Information Warfare Principles and Opewrations, 1998
|
10 |
Jung Ho Eom Sung Su choi, Tai-Myoung chung, An Introdction of cyber warfare Honghrohers, 2012
|
11 |
NSHC. 6.25 Cyber terror Analysis Cyber terror Analysis Reports, 2013.
|
12 |
Jung Ho Eom. Sung Su Ohoi, Tai-Myung, An Introduction of cyber warfare, Hang Publishers, 2012
|
13 |
Ssang kul Lee. US DoD, Cyber Command published an increase of Cyber Secuntiy Experts , Internet & Security Weekly, 2013.
|
14 |
Michael N. Schmitt et al, Tallinn Manual on the international law applicable to cyber warfare, NATO CCDEOE, 2013.
|
15 |
Hong Kook Park, Ki Cheong Jeon, Decision Making Supporti System, 1999
|