최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기반도체디스플레이기술학회지 = Journal of the semiconductor & display technology, v.22 no.3, 2023년, pp.112 - 118
김범석 (상명대학교 전자정보시스템공학과) , 김정현 (상명대학교 전자정보시스템공학과) , 김민석 (상명대학교 휴먼지능로봇공학과)
As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security proble...
Kim, D. W., Lee, M. S., Jeong, J. Y., Kim, and H. C.,?"COVID19 Related Keyword Analysis: Based on Topic?Modeling and Semantic Network Analysis," Journal of?the Semiconductor & Display Technology, Vol. 21, No.?2, pp.127-132, 2022.
Kang, Y. G., Yoo, J. D., Park, E.J., Kim, D. H., and Kim,?H.K., "Design and Implementation of Cyber Attack?Simulator based on Attack Techniques Modeling,"?Journal of the Korea Society of Computer and?Information, Vol.25, pp.65-72, 2020.
Taherdoost, H., "Understanding cybersecurity frameworks and information security standards-a review?and comprehensive overview," Electronics, Vol. 11, pp.?2181, 2022.
Lee, J. Y., Moon, D. S. and Kim, I. K., "Technological?Trends in Cyber Attack Simulations." Electronics and?Telecommunications Trends, Vol. 35, pp. 34-48, 2020.
Rabie, A. R., Bassam, W. A., Jalawi, S. A., Abdullah, J.?A., Ayman, E.S., and Mohamed, M. D., "Cybersecurity?and Countermeasures at the Time of Pandemic", Journal?of Advanced Transportation, Vol. 2021, pp. 1-19, 2021.
Al-Qahtani, A. F., and Cresci, S., "The COVID-19?scamdemic: A survey of phishing attacks and their?countermeasures during COVID-19," IET Information?Security, Vol.16, pp.324-345, 2022.
Singh, S., Sharma, P. K., Moon, S. Y., Moon, D. S., and?Park, J. H., "A comprehensive study on APT attacks and?countermeasures for future networks and communications: challenges and solutions", The Journal of Supercomputing, Vol. 75, pp. 4543-4574, 2019.
Choi,Y. K., Jang I. S., Whoang, I., Kim, T. G., Hong, S.?J., Park, I. S., Yang, J. S., Kwon, Y. J., and Kang, J. M.,?"Design and Implementation of Cyber Range for Cyber?Defense Exercise Based on Cyber Crisis Alert." Journal?of the Korea Institute of Information Security &?Cryptology, Vol. 30, pp. 805-821, 2020.
Milian, E. Z., Spinola, M. D. M., and Carvalho, M. M.,?"Fintechs: A literature review and research agenda",?Electronic Commerce Research and Applications, Vol.?34, 2019.
Jiang, H., Choi, T., and Ko, R. K. L., "Pandora: A cyber?range environment for the safe testing and deployment?of autonomous cyber-attack tools," Security in Computing and Communications, Vol. 1364, pp. 1-20, 2021.
Yamin, M. M., Katt, B., and Gkioulos, V., "Cyber ranges?and security testbeds: Scenarios, functions, tools and?architecture," Computers & Security, Vol. 88, pp.?101636, 2020.
Yamin, M. M., and Katt, B., "Use of cyber attack and?defense agents in cyber ranges: A case study," Computers & Security, Vol. 122, pp. 102892, 2022.
Katina, P. F., and Keskin, O. F., "Complex system governance as a foundation for enhancing the cybersecurity of cyber-physical systems," International Journal?of Cyber Warfare and Terrorism, Vol. 11, pp. 1-14, 2021.
Kim, D. H., Kim, Y. H., Ahn, M. K., and Lee, H. J.,?"Automated cyber threat emulation based on ATT&CK?for cyber security training," Journal of the Korea?Society of Computer and Information, Vol. 25, pp. 71-80, 2020.
Yoo, J. D., Park, E., Lee, G., Ahn, M. K., Kim, D., Seo,?S., and Kim, H. K., "Cyber attack and defense?emulation agents," Applied Sciences, Vol. 10, pp. 2140,?2020.
Mohamed, N., "Study of bypassing Microsoft Windows?Security using the MITRE CALDERA framework"?F1000 Research, Vol. 11, pp. 16-25, 2022.
Sainadh, J., Navya, Y. S., Raja, P., Tagore, G., and Rao,?G. R. K., "Dynamic Malware Analysis Using Cuckoo?Sandbox", 2018 Second International Conference on?Inventive Communication and Computational?Technologies, pp. 1056-1060, 2018.
Jjschwartz, "NetworkAttackSimulator (Version 0.9.1)."?Retrieved August 12, 2021, from https://github.com/Jjschwartz/NetworkAttackSimulator (Publication Date:?N/A).
Microsoft, "CyberBattleSim (Version 2.4.0)." Retrieved?August 26, 2021, from https://github.com/microsoft/CyberBattleSim.
Walter, E., Ferguson-Walter, K., and Ridley, A., "Incorporating Deception into CyberBattleSim for Autonomous Defense." Retrieved May 18, 2023, from?https://arxiv.org/abs/2108.13980, 2021.
Xiang, X., Foo, S., and Zang, H., "Recent Advances in?Deep Reinforcement Learning Applications for Solving?Partially Observable Markov Decision Processes?(POMDP) Problems Part 2 - Applications in Transportation, Industries, Communications and Networking?and More Topics", Machine Learning and Knowledge?Extraction, Vol. 3, pp. 863-878, 2021.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.