최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.32 no.2, 2022년, pp.243 - 253
신미주 (전남대학교) , 윤성수 (전남대학교) , 엄익채 (전남대학교)
Recently, cyber attacks on national infrastructure facilities have continued to occur. As a result, the vulnerabilities of ICS-CERTs have more than doubled from last year, and the vulnerabilities to industrial control systems such as nuclear facilities are increasing day by day. Most control system ...
NVD Vulnerabilities, "National Vulnerability Database" https://nvd.nist.gov/vuln, Apr. 2022.
MITRE CVE, "CVE Data Feeds" https://cve.mitre.org/cve/data_feeds.html, Apr. 2022.
CISA ICS-CERT Advisories, "ICS-CERT Advisories" https://us-cert.cisa.gov/ics/advisories, Apr. 2022.
KrCERT Vulnerability Informations,"KISA Vulnerability Informations" https://www.krcert.or.kr/data/secInfoList.do, Apr. 2022
NVD Data Feed for Vulnerabilities,"NVD CVE Data" https://nvd.nist.gov/vuln/data-feeds Apr. 2022
NVD Official Common Platform Enumeration (CPE) Dictionary, "NVDCPE Data" https://nvd.nist.gov/products/cpe, Apr. 2022
MITRE Common Weakness Enumeration, "Mitre CWE Data" https://cwe.mitre.org/data/downloads.html, Apr. 2022
MITRE Common Attack Pattern Enumeration and Classification, "Mitre CAPEC data" https://capec.mitre.org/data/index.html, Apr. 2022
J.T. Richard and T. Chothia, "Learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control Systems," International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, pp. 100-116, Dec. 2020
Hee-Hyun Kim and Jin-Ho Yoo, "A Study on ICS/SCADA System Web Vulnerability," The Jounal of Society for e-Business Studies 24(2), pp. 15-27, Nov. 2019
Xinming Ou and Doina Caragea "Predicting Cyber Risks through National Vulnerability Database," Information Security Journal: A Global Perspective,vol. 24, no. 4, pp. 194-206, Nov. 2015
Richard J. Thomas and Joseph Gardiner "Catch Me If You Can: An In-Depth Study of CVE Discovery Time and Inconsistencies for Managing Risks in Critical Infrastructures," CPSIOTSEC' 20: Proceedings of the 2020 Joint Workshop on CPS & IoT Security and Privacy, pp. 49-60, Nov. 2020
Sung-Min Kim and Dong-Kwan Kim,"Automatic Detection of Software Security Vulnerabilities," Jonal of The Transactions of the Korean Institute of Electrical Engineers, 70(3), pp. 157-162, Sep. 2021
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.