최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of information processing, v.31, 2023년, pp.842 - 850
Shourya, Rajulapati (Hitachi Ltd.) , Kumagai, Yoko (Hitachi Ltd.) , C, Ashokkumar (Hitachi Ltd.) , Yamazaki, Hiroki (Hitachi Ltd.) , Nakakoji, Hirofumi (Hitachi Ltd.)
초록이 없습니다.
[1] Ellison, R., Goodenough, J., Weinstock, C. and Woody, C.: Evaluating and Mitigating Software Supply Chain Security Risks, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Technical Note, CMU/SEI-2010-TN-016 (2010).
[2] Hiesgen, R., Nawrocki, M., Schmidt, T.C. and Wählisch, M.: The Race to the Vulnerable: Measuring the Log4j Shell Incident, ArXiv (2022).
10.1109/ICCAKM54721.2022.9990554 [3] Kaushik, K., Dass, A. and Dhankhar, A.: An approach for exploiting and mitigating Log4J using Log4Shell vulnerability, 2022 3rd International Conference on Computation, Automation and Knowledge Management ( ICCAKM ), pp.1-6, DOI: 10.1109/ICCAKM54721.2022.9990554 (2022).
10.1109/ICCCNT51525.2021.9579611 [4] Alkhadra, R., Abuzaid, J., AlShammari, M. and Mohammad, N.: Solar Winds Hack: In-Depth Analysis and Countermeasures, 2021 12th International Conference on Computing Communication and Networking Technologies ( ICCCNT ), pp.1-7, DOI: 10.1109/ICCCNT51525.2021.9579611 (2021).
10.1109/MITP.2022.3172877 [6] Kshetri, N.: Economics of Supply Chain Cyberattacks, IT Professional , Vol.24, No.3, pp.96-100, DOI: 10.1109/MITP.2022.3172877 (2022).
[7] Ministry of Economy, Trade and Industry: Task Force on Software Management Methods to Ensure Cyber Physical Security, available from <https://www.meti.go.jp/shingikai/mono_info_service/sangyo_cyber/wg_seido/wg_bunyaodan/software/index.html>
[8] Sonatype's 8th Annual State of the Software Supply Chain Report, 8th Annual State of the Software Supply Chain, Sonatype (2023) (online), available from <https://static.rainfocus.com/rsac/us23/exh/1435012080848001wW0l/exhibitorboothresource/8th%20Annual%20SSCR%20-%202023_1678297837960001ilcs.pdf> (accessed 2023-02-21).
10.1016/j.cose.2012.04.001 [9] Ahmad, A., Hadgkiss, J. and Ruighaver, A.B.: Incident response teams - Challenges in supporting the organizational security function, Computers & Security , Vol.31, No.5, pp.643-652, ISSN 0167-4048 (2012).
[10] Kuki, R., Ueda, T., Sasaki, T., Yoshioka, K. and Matsumoto, T.: A proposal of Automatic Estimation of Target Devices and Vulnerabilities of Cyber Attacks Observed in Honeypots, IPSJ Research Report , Vol.2022-CSEC-97, No.21 (2022).
[11] Sugimori, R., Ito, A., Kanda, T. and Inoue, K.: Vulnerability detection tool using version detection for reused libraries, Proc. Software Engineering Symposium 2021 (2021).
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.