1 |
이영욱. "4 차 산업혁명시대 우리나라 드론의 발전 방향." 융합보안논문지 18.5 (2018): 3-10.
|
2 |
박근석, 천상필, 김성표, & 엄정호. (2018). 전장에서 드론을 활용한 보안 위협과 시나리오. 융합보안논문지, 18(4), 73-79.
|
3 |
Low Cost and Portable Jammer, Phrack issue 0x3c(60), article 13. Dec. 28, 2002
|
4 |
J. Warner and R. Johnston, "A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable to Spoofing," J. Security Administration, vol. 25, 2002. pp. 5-8.
|
5 |
Rodday, N. M., Schmidt, R. D. O., and Pras, A., "Exploring security vulnerabilities of unmanned aerial vehicles." Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, pp.993-994, 2016.
|
6 |
Potter, Bruce. "Microsoft SDL threat modelling tool." Network Security 2009.1 (2009): 15-18.
DOI
|
7 |
국토교통부훈령 제872호 2017.6.5. 타법개정, 무인항공기 비행안전 제고를 위한 입법.정책 과제
|
8 |
https://www.commoncriteriaportal.org/pps/Protection Profiles CCV files
|
9 |
Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
|
10 |
Shostack, Adam. "Experiences Threat Modeling at Microsoft." MODSEC@ MoDELS. 2008.
|
11 |
DoDI 8500.2, February 6, 2003
|