1 |
Alcaraz, C. and S. Zeadally, "Critical Infrastructure Protection : Requirements and Challenges for the 21st Century", In International Journal of Critical, Infrastructure Protection(IJCIP), Vol.8, 2015, 53-66.
DOI
|
2 |
Bahsi, H. and O.M. Maennel, "A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures", Secure IT Systems, Vol. 9417, 2015, 3-10.
DOI
|
3 |
Im, K.H., "Control System Security Vulnerabilities and Countermeasures", Korea University, 2011. (임길환, "제어시스템 보안취약점현황 및 개선방안 연구", 고려대학교 석사학위논문, 2011.)
|
4 |
Jeimy, J., M. Cano, and Ph.D, CFE, "The Information Security Function : Current and Emerging Pressures From Information Insecurity", ISACA Journal, Vol.6, 2014.
|
5 |
Langner, R., "The RIPE Framework : A Process-Driven Approach towards Effective and Sustainable Industrial Control System Security", Langner Communications GmbH, 2013.
|
6 |
Suter, M., "A Generic National Framework For Critical Information Infrastructure Protection(CIIP)", Center for Security Studies, ITU, 2007.
|
7 |
Lee, H.J., "The Study on Security Enhancement of National Control System for Critical Infrastructure : Focusing on Comparison about Policy of Major Countries and Domestice", Sangmyung University, 2016. (이현주, "국가기반 강화를 위한 제어시스템 보안대응 연구 : 주요국과 한국의 정책 비교중심으로", 상명대학교 석사학위논문, 2016)
|
8 |
Nanni, G., "Security Posture for Critical Information Infrastructure Protection(CIIP)", RSAC Conference, 2015.
|
9 |
Sodoma, P., "Resiliency Rules : 7 Steps for Critical Infrastructure Protection", Microsoft, 2007.
|
10 |
Yoo, J.Y. and N.Y. Jeong, "A Study on the New Management System Considering Shadow IT", Journal of Information Technology Services, Vol.15. No.3, 2016, 33-50. (유지연, 정남영, "Shadow IT를 고려한 새로운 관리체계 도입에 관한 연구", IT서비스학회, 제15권, 제3호, 2016, 33-50.)
|