최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of Internet Computing and Services = 인터넷정보학회논문지, v.23 no.5, 2022년, pp.111 - 126
장지수 (Department of Computer Engineering, Sejong University) , 김국진 (Department of Computer Engineering, Sejong University) , 윤석준 (Department of Cyber Warfare Research Center, Sejong University) , 박민서 (Cyber Technology Center, Agency for Defense Development) , 안명길 (Cyber Technology Center, Agency for Defense Development) , 신동규 (Department of Computer Engineering, Sejong University)
As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical ...
C. S. Park and Y. S. Park, "A study on the improvement of capability assessment and the plan for enhancing cyber warfare capability of Korea," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, no. 5, pp. 1251-1258, 2015. https://doi.org/10.6109/jkiice.2015.19.5.1251
M.R. Driels. Weaponeering : Conventional Weapon System Effectiveness. Reston, Va: American Institute of Aeronautics and Astronautics, Inc., 2013. Print.
NOEL, Steven, et al. Analyzing mission impacts of cyber actions (AMICA). In: NATO IST-128 Workshop on Cyber Attack Detection, Forensics and Attribution for Assessment of Mission Impact. 2015.
Seung Keun Yoo et al. "Utilization of Defense Simulation Model in Warfighting Experimentations." The Korea Society for Simulation, pp. 117-122, May, 2005.
Army, U. S., "Army Doctrine Publication (ADP) 3-0 Operations" Washington, DC, July, 2019.
The Joint Staff, "Joint Publication (JP) 3-0, Joint Operation," Washington, DC, Oct, 2018.
E.J. Robert, "Committee on national security systems (CNSS) glossary", Mar, 2022.
The Joint Staff, "Joint Publication (JP) 3-12, Cyberspace Operation," Washington, DC, Jun, 2018.
진하 황, "M&S를 활용한 무기체계 효과분석에 관한 연구 감시장비 대안분석을 중심으로" 한성대학교 국방과학대학원, 국방M&S학과 석사학위논문, Aug. 2019.
S.J. Kim et al., "Study on Cyber Attack Damage Assessment Framework," IEEE Access, Jun, 2022. https://doi.org/10.1109/ACCESS.2022.3179977
D.E. Mann et al., "Towards a Common Enumeration of Vulnerabilities", 2nd Workshop Research with Security Vulnerability Databases, 1999.
M. Peter, et al. "A complete guide to the common vulnerability scoring system version 2.0." Published by FIRST-forum of incident response and security teams. Vol. 1, Jun, 2007.
Chief of Staff. "Army Techniques Publication (ATP) 3-09.12 Field Artillery Counterfire and Weapons Locating Radar Operation" Washington, DC, Oct, 2021.
Chief of Staff. "Field Manuals (FM) 3-09 Fire Support and Field Artillery Operations" Washington, DC, Apr, 2020.
Joint Chiefs of staff. "Joint Publication (JP) 3-09.3 Close Air Support." Washington, DC, Jul, 2009.
The Joint Staff, "Joint Publication (JP) 5-0 Joint Operation Planing" Washington, DC, Aug, 2011.
NERC, "Appendix 2 to the NERC Rules of Procedure", Atlanta, GA, Jan, 2021. https://www.nerc.com/AboutNERC/RulesOfProcedure/Appendix_2_ROP_Definitions_20210119.pdf
K.J. Kim et al. "Study on Prioritization of Actions by Classifying and Quantifying Cyber Operational Elements Using 5W1H Method." IEEE Access 10, 74765-74778, 2022. https://doi.org/10.1109/ACCESS.2022.3190530
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.