최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기디지털콘텐츠학회 논문지 = Journal of Digital Contents Society, v.20 no.6, 2019년, pp.1173 - 1180
Kim, HyunJin , Shon, Taeshik
초록이 없습니다.
ACT ON THE PROMOTION OF SMART CITY DEVELOPMENT AND INDUSTRY
“Analysis of the Cyber Attack on the Ukrainian Power Grid” Lee 2016
“WIN32/INDUSTROYER A new threat for industrial control systems” Cherepanov 2017
“Threat Intelligence: What is it, and How Can it Protect You from Today’s Advanced Cyber-Attacks?” WEBROOT 2014
“Standardizing cyber threat intelligence information with the structured threat information expression(STIX)” Barnum 2012
“The trusted automated exchange of indicator information (TAXII)” Connolly 2014
“Hunt Evil: Your Practical Guide to Threat Hunting“ Sqrrl 2017
“A Practical Model for Conducting Cyber Threat Hunting” Gunter 2019
ICS-CERT Alerts website
NIST NVD website
MITRE CVE website
MITRE CRIT website
“Smart City Policy and Future Direction” Lee 2017
“Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies” Fabro 2016
“Communication Network dependencies for ICS/SCADA Systems” ENISA 2016
“Industrial Internet of Things Volume G4: Security Framework” Schrecker 2016
“Industrie 4.0 Security Guidelines - Recommendation and Actions” Bokamper 2016
International Journal of Engineering Science and Technology lakhina 2 6 1790 2010 "Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD"
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.