Analysis of Cybersecurity Threats and Vulnerabilities in Metaverse Environment
![]() |
Jinwon Choi
(상명대학교 전자정보시스템공학)
Jaewoo, Kwon (상명대학교 전자정보시스템공학) Sehee Lee (상명대학교 전자정보시스템공학) Wonhyung Park (상명대학교 정보보안공학과) Tae-Kyung Cho (상명대학교 정보보안공학과) |
1 | Brown, Dalvin. "What is the 'metaverse'? Facebook says it's the future of the Internet". Washington Post. 2021.08. |
2 | Elements of a Metaverse, What is a metaverse?, "https://www.gartner.com/en/articles/what-is-a-metaverse", 2022.01. |
3 | Hankyoreh, "Stalking and similar sexual acts… 'New type' metaverse child sex crime, is it punishable", https://www.hani.co.kr/arti/society/society_general/1012415.html. |
4 | Hyungyeong Kim, and Hyungwon Kwon."A study on the analysis of security vulnerabilities in metaverse." Proceedings of the Korean Telecommunications Society Conference, 1454-1455, 2021. |
5 | Y. Wang, Z. Su, N. Zhang, D. Liu, R. Xing, T. Hao Luan and X. S. Shen, "A Survey on Metaverse: Fundamentals, Security, and Privacy," arXiv preprintarXiv:203.0262, 2022. |
6 | Electronic newspaper, "Metaverse and cyber security strategy to protect personal information must come together", https://www.etnews.com/20220315000153, 2022. |
7 | Seunghwan Lee, "Metaverse begins: 5Major Issues and Forecast" SPRi Analysis Issue Report, IS-116, Apr, 2021. |
8 | Turner, M. J. Matrix methods of Structural Analysis, 1st Ed., Vol. 1, Macmillan, New York, pp.203~206, 1974. |
9 | Park, D., Kim, S., Lee, Y., and Kim, C., Performance Evaluation of Propeller for Electrically Powered HALE UAV; Part II. Computational Analysis, 2021. |
10 | Ahn, S. W., Cho, J. Y., and Kim, S. J., "An Alternative Computing Algorithm of the Penalized Weighted Residual Method for the Structural Dynamics," Journal of the Energy Convergence Society, Vol. 25, No. 6, pp. 83~92, 1999. |
![]() |