1 안명길, "사이버전사의 훈련을 위한 시스템 구축 방안 연구" 한국정보보호학회 26 (26): 533-540, 2016
2 Lloyd Wihl, "Training for the Combined Cyber /Kinetic Battlefield" 9 (9): 1-11, 2015
3 Len Bass, "Software Architecture in Practice" Addison-Wesley Professional 2012
4 B. Ferguson, "National Cyber Range Overview" 123-128, 2014
5 T. Bonaci, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics" National Science Foundation 1-11, 2015
6 Strom, B. E., "MITRE ATT&CK™: Design and Philosophy" 2018
7 Rossey, L. M., "Lariat: Lincoln Adaptable Real-Time Information Assurance Testbed" 6 : 6-6, 2002
8 Applebaum, A., "Intelligent, Automated Red Team Emulation" ACM 363-373, 2016
9 SHIVAYOGIMATH, Chaitra N., "An Overview of Network Penetration Testing" 3 (3): 408-413, 2014
1 안명길, "사이버전사의 훈련을 위한 시스템 구축 방안 연구" 한국정보보호학회 26 (26): 533-540, 2016
2 Lloyd Wihl, "Training for the Combined Cyber /Kinetic Battlefield" 9 (9): 1-11, 2015
3 Len Bass, "Software Architecture in Practice" Addison-Wesley Professional 2012
4 B. Ferguson, "National Cyber Range Overview" 123-128, 2014
5 T. Bonaci, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics" National Science Foundation 1-11, 2015
6 Strom, B. E., "MITRE ATT&CK™: Design and Philosophy" 2018
7 Rossey, L. M., "Lariat: Lincoln Adaptable Real-Time Information Assurance Testbed" 6 : 6-6, 2002
8 Applebaum, A., "Intelligent, Automated Red Team Emulation" ACM 363-373, 2016
9 SHIVAYOGIMATH, Chaitra N., "An Overview of Network Penetration Testing" 3 (3): 408-413, 2014