참고문헌
- Sedong Kwon, Hyunmin Park, and Kangsun Lee, 'A Novel Mobility Prediction Algorithm Based on User Movement History,' 2004 Asia Simulation Conference (AsiaSim 2004), Lecture Notes in Computer Science 3398, pp.419-428, October, 2004 https://doi.org/10.1007/b105611
- 김인중, 정윤정, 박중길, 원동호, '중요핵심기반시설(SCADA)에 대한 보안위험관리 연구', 한국통신학회논문지 Vol. 30, 2005년 9월
- Kwang Min Park, Dong Kwang, PSpice Understanding and Application (revised), 1992, ISBN
- W. Reisig, Petri Nets, An Introduction, EATCS, Monographs on Theoretical Computer Science, W.Brauer, G. Rozenberg, A. Salomaa(Eds.), Springer Verlag, Berlin, 1985
- Edward Yourdon, Modern Structured Analysis, Prentice-Hall, 1989
- Paul E. Black, ed, 'deterministic finite state machine', Dictionary of Algorithms and Data Structures, NIST. http://www,nist.gov/dads/HTML/determFinitStateMach.html
- L.M. Kristensen, S. Christensen, K. Jensen: The Practitioner's Guide to Coloured Petri Nets. International Journal on Software Tools for Technology Transfer, 2 (1998), Springer Verlag, 98-132 https://doi.org/10.1007/s100090050021
- Paul Tuinenga, SPICE: A Guide to Circuit Simulation and Analysis Using PSpice (3rd Edition), Prentice-Hall, 1995, ISBN 0-13-158775-7
- MICTS(Previously GMITS), ISO/lEC 27005 ISMS Risk Management. 2005
- CSE(Canadian Secutiy Establishment), 'A Guide to Security Risk Management for IT Systems', Government of Canada, Communications Security Establishment(CSE)', 1996
- MacDonald, David/ Mackay, Steve (EDT), Practical Hazops, Trips and Alarms (Paperback), Butterworth-Heinemann, 2004
- RAC, Fault Tree Analysis Application Guide, 1991
- CMU, OCTAVE(Operationally Critical Threat, Assets and Vulnerability Evalustion), 2001. 12
- Theo Dimitrakos, Juan Bicarregui, KetilStolen. CORAS - a framework for risk analysis of security critical systems. ERCIM News, number 49, pages 25-26, 2002
- Young-Hwan Bang, YoonJung Jung, Injung Kim, Namhoon Lee, GangSoo Lee, 'The Design and Development for Risk Analysis Automatic Tool,' ICCSA2004, LNCS 3043, pp.491-499, 2004
- http://www.cramm.com, CRAMM(CCTA Risk Analysis and Management Method)
- Palisade Corporation, @RISK, http://www.palisade.com
- Countermeasures, Inc., , http://www.buddysystem.net
- ISO/IEC17799 & ISO/IEC27001(revised BS7799 part 2), Code of Practice for Information Security Management. 2000
- BSI, http://www.bsi.bund.de/english/gshb/manual/index.htm, 2003
- NCSC, 사이버안전메뉴얼, 2004
- InJung Kim, YoonJung Chung, YoungGyo Lee, Dongho Won, 'A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems,' ICCSA2005, LNCS3043, May, 2005
- Injung Kim, YoonJung Jung, JoongGil Park, Dongho Won, 'A Study on Security Risk Modeling over Information and Communication Infrastructure,' SAM04(Security and Management 2004), pp.249-253, 2004
- Yoon Jung Jung, InJung Kim, JoongGil park, Dongho Won, 'A Practical Security Risk Analysis Process of Information System,' pp.576-581, 4th APIS, 2005
- Yoon Jung Chung, InJung Kim, NamHoon Lee, Taek Lee, Hoh Peter In, 'Security Risk Vector for Quantitative Asset Assessment', LNCS 3481/2005, Computational Science and Its Applications - ICCSA2005 May, 9-12, 2005
- 정윤정, 김인중, 이철원, '실용적인 위험분석 방법론 설계와 모듈 구현,' 한국통신학회 논문지 제27권 11C호, 한국통신학회 2002
- 엄정호, 우병구, 김인중, 정태명, '정보시스템의 효율적인 위험 관리를 위한 실용적인 위험감소 방법론에 관한 연구', 정보처리학회논문지C, 제10-C권 제2호, 2003
- Namhoon Lee, YoonJung Jung, InJung Kim, JungGil Park, 'The design and Implentation of Risk Analysis Tools and Suitable Countermeasure Choice Algorithm,' pp.49-53, SCI2004, July, 2004. 3
- 김인중, 정윤정, 이남훈, 이재욱, '국가 공공기관 정보통신기반 시설에 대한 위협 분석시 고려사항,' WISC2003 논문집, 2003년 9월
- YoonJung Jung, InJung Kim, SeungHyun Kim, 'The Design and Implementation for the Practical Risk Analysis Tools', Second Summer School 2003 by IFIP WG9.2, 9.6/11.7, 9.8, August, 2003
- D.S. Kim, Y.J. Jung, and T.M. Chung, 'PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label,' The Journal of Supercomputing, Volume 33, Number 1, Pages: 103-121, July, 2005 https://doi.org/10.1007/s11227-005-0224-0
- 김영갑, 이택, 인호, 정윤정, 김인중, 백두권, '정보통신기반에 대한 피해파급 모델,' WISC2005. 2005년 9월
- US-CERT, 'US-CERT Vulnerability Notes Database,' http://www.kb.cert.org/vuls
- Common Criteria(CC), http://www.commoncriteria.org