1 |
KISA, "Special Report of WannaCry Analysis", pp80-85, 2017.
|
2 |
Sysmantec, "WannaCry : Ransomware attacks show strong links to Lazarus group", https://www.symantec.com/, 2017.
|
3 |
Richard B. Andres, "The Emerging Structure of Strategic Cyber Offense, Cyber Defense, and Cyber Deterrence," in Derek S. Reveron (ed.) Cyber space and National Security : Threats, Opportunities, and Power in a Virtual World, Washington DC : Georgetown University Press, 2012.
|
4 |
Jeffrey Hunker, Bob Hutchinson, and Jonathan Margulies, "Role and Challenges for Sufficient Cyber-Attack Attribution," Dartmouth College : Institute for Information Infrastructure Protection, January 2008.
|
5 |
Hyo-young Lim, Wan-ju Kim, Hong-jun Noh, Jae-sung Lim. "Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups". Journal of KICS, 42(1), 193-204. 2017
DOI
|
6 |
Wanju Kim, Changwook Park, Soojin Lee, Jaesung Lim, "Methods for Classification and Attack Prediction of Attack Groups based on Framework of Cyber Defense Operations", Journal of KIISE : Computing Practices and Letters 20(6), pp. 317-328, Jun. 2014.
|
7 |
KISA, "Cyber Threat Trend in 2016 and 7 Cyber Threat Forecasts in 2017", 2017.
|
8 |
Gordon, Lawrence A, and Martin P. Loeb. "The economics of information security investment.", ACM Transactions on Information and System Security (TISSEC) 5.4, pp438-457, 2002.
DOI
|
9 |
Wansoo Cho, Taekyu Kim, Yonghyun Kim. "Modeling and Simulation of Cyber Damage Assessment for Cyber Warfare Effectiveness Analysis", Proceedings of Spring Conference of KIIE, pp 3119-3125. 2016.
|
10 |
Yoon Jong-Sung et al., "Influence Indicator Research and Development Trend Analysis Report", ADD, ADDR-525-150921, 2015.
|
11 |
Kim Tae-Kyu et al.. "Research on Matrix of Measurement of Effectiveness(MOEs) and Measurement of Performance(MOPs) for Cyber Threat and Defense Behavior on Cyberwarfare Simulation", Proceedings of Spring Conference of KIIE, pp3114-3118. 2016.
|
12 |
Danyliw, Roman, Jan Meijer, and Yuri Demchenko. "The incident object description exchange format." 2007.
|
13 |
Ostler, Ryan. "Defensive cyber battle damage assessment through attack methodology modeling", Air Force Inst of Tech Wright-patterson AFB of Graduate School of Engineering and Management, 2011.
|
14 |
Denning, D. "Assessing Cyber War. Assessing War: The Challenge of Measuring Success and Failure", Blanken, L., Ed, 266-284. 2015
|
15 |
Kotenko, Igor, and Andrey Chechulin. "A cyber attack modeling and impact assessment framework.", Cyber Conflict (CyCon), 2013 5th International Conference on. IEEE, 2013.
|
16 |
국방부, 국방부훈령 제1057호(국가 중요시설 지정 및 방호 훈령), 2009.
|
17 |
OWASP, "The OWASP Risk Rating Methodology", https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology, 2017
|
18 |
FIRST, "Common Vulnerability Scoring System Version 3.0 Calculator", https://www.first.org/cvss/calculator/3.0, 2017
|
19 |
Jong-in Lim et al., Korea Univ., "Research on development of cyber threat scenarios and countermeasures", 2014.
|
20 |
NIST, "Special Publication 800-30, Risk Management Guide for Information Technology Systems", July 2002.
|