References
- Ariel Futoransky et al, "Building computer network attacks," Technical report, Core Labs, Core Security Technology, 2003.
- 엄정호 외 2명, "보안 안전성을 위한 자동화 보안진단평가 시스템에 관한 연구," 디지털산업정보학회논문지, 제5권 제4호, December, 2009, pp. 109-116.
- 엄정호 외 3명, "사이버 공격과 보안 기술," 홍릉과학출판사, 2009, pp. 3-9.
- Curt A. Carver, et al, "Military Academy Attack/Defense Network," Annual IEEE Information Assurance Workshop, Jun, 2002, pp. 29-34.
- Kristopher Daley, Ryan Larson, and Jerald Dawkins, "A Structural Framework for Modeling Multi-stage Network Attacks," Proceeding of the International Conference on Parallel Processing Workshops, Aug, 2002, pp. 5-10.
- Bruce Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's Journal, Dec, 1999.
- Cynthia Phillips and Laura Painton Swiler, "A graph-based system for network vulnerability analysis," Proceedings of the 1998 workshop on new security paradigms, ACM press, Sept, 1998, pp. 71-79.
- Wei Wang and Thomas E. Daniels, "A Graph Based Approach Toward Network Forensics Analysis," ACM Transactions on Information and Systems Security, Vol. 12, No. 1, Oct, 2008, pp. 401-433.
- Bruce Schneier, "Secrets and Lies: Digital Security in a Networked World," John Wiley & Sons, 2000.
- Vineet Saini, et al, "Threat modeling using attack trees," Journal of Computing Sciences in Colleges, Vol. 23, Issue4, Apr, 2008, pp. 124-131.
- Nayot Poolsapassit and Indrajit Ray, "Investigating Computer Attacks using Attack Trees," Advances in Digital Forensics III, Vol. 242, Nov, 2007, pp. 331-343.
- Seyit Anmet Camtepe and Bulent Yener, "Modeling and Detection of Complex Attacks," Proceedings of the third international conference on security and privacy in communication networks, Sept, 2007, pp. 234-243.
- Hubert Comon, et al, "Tree Automata Techniques and Applications," TATA, Sept, 2002.
- Jung ho Eom, et al, "Active Cyber Attack model for Network system's Vulnerability Assessment," International Conference on Information Science and Security(ICISS 2008), Jan, 2008, pp. 153-158.
- Jong-yeub Lee, et al, "Monitoring and Investigation of DoS Attack," KNOM Reveiw, Vol. 6, No. 2, Feb, 2004, pp. 33-40.
- Andrew P. Moore et al, "Attack Modeling for Information Security and Survivability," Technical Note, CMU/SEI-2001-TN-001, Mar, 2001.