References
- Ban gjiho, Halan, Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software, THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY(KICS), vol. 38, no. 4, pp 335-343, 2013 https://doi.org/10.7840/kics.2013.38C.4.335
- Jeong dahye, Choejin-yeong, Leesonghui, Nuclear-related Software analysis based on secure coding, Journal of Korea Institute of Information Security and Cryptology, vol. 23 no. 2, pp. 243-250, 2013 https://doi.org/10.13089/JKIISC.2013.23.2.243
- Hangyeongsuk, KimTaeHwan, Hagiyoung, Imjaemyeong, Pyochangwoo, An Improvement of the Guideline of Secure Software Development for Korea E-Government, Journal of Korea Institute of Information Security and Cryptology, vol. 22 no. 5, pp1179-1189, 2012
- Kim dongwon, Han geunhui, A Study on Self Assessment of Mobile Secure Coding, Journal of Korea Institute of Information Security and Cryptology, vol. 22 no. 4, pp. 901-911, 2012
- Kim seonggeun, Lee jaeil, Analyzing Secure Coding Initiatives: An Ecosystem Approach, Journal of Korea Institute of Information Security and Cryptology, vol. 22 no. 5, pp. 1205-1216, 2012
- Junesung choi, Wooje Kim, Wonhyung Park, Kwangho Kook, Defense SW Secure Coding Application Method for Cyberwarfare Focused on the warfare System Embedded SW Application Level, Journal of Korea Association of Defense Industry Studies, vol. 19, no. 2, pp. 91-103, 2012
- Junesung choi, Wooje Kim, Kwangho Kook, warfare System Embedded SW Secure Coding Application Method, 2012 KORMS Proceedings pp. 1454-1466, 2012
- Bongwoo Lee, JaHee Kim, wooje Kim, "ITS project manager research core competencies Using QFD and AHP", Journal of IT Service, vol. 10, no. 1, pp. 89-103, 2011
- JaHee Kim, Wooje Kim, hyeongi Cho, eunyoung Lee, minwoo Seo, A Study on the Development of Evaluation Model for Selecting a Standard for DITA using AHP, IE Interfaces, vol. 25, no. 1, pp. 96-105, 2012 https://doi.org/10.7232/IEIF.2012.25.1.096
- LeeBuyoon, Alerts on Car hacking vulnerability, Journal of Mechanics , vol. 51, no. 11, pp. 10-11, 2011
- Kimjungkook, Kimseyoung, Threat to weapon system in the cyberwar, Latest Technology Trends, Defense Technology and Quality, pp. 4-9, 2011
- MOPAS, Administrative information system notice amendment to the operating instructions, 2012
- MOPAS, Information System Audit Guide Line, 2012
- MOPAS, Software Development Secure Coding Guide, 2012
- MOPAS, JAVA Security Coding Guide, 2012
- MOPAS, Android Security Coding Guide, 2012
- MOPAS, Diagnostic software security weaknesses Guide, 2012
- Nor Harisah Zainuddin, "Secure Coding in Software Development", 2011 5th Malaysian Conference in Software Engineering, 2011
- Kittipong Kittichokechai, "Secure Source Coding with Action-dependent Side Information", 2011 IEEE Inetrnational Symposium on Information Theory Procdeedings
- Ravi Tandon, "Secure Source Coding with a Helper", IEEE TRANSACTIONS ON INFORMATION THEORY, 2011
- Robert C. Seacord, "Secure Coding in C and C++", Addison-Wesley Professional, 2005
- Fred Long, Dhruv Mohindra,Robert C. Seacord, Dean F.Sutherland, David Svoboda, "The Cert Oracle Secure Coding Standard for Java", Prentice Hall, (2008)
- Robert C. Seacord, "The CERT Secure Coding Standard for C", Addison-Wesley, 2008
- James F Dunnigan, "How to Make War : A Comprehensive Guide to Modern Warfare in the Twenty-First Century", Quill, 2003
- http://www.misra-c.com/Activities/MISRAC/tabid/160/Default.a, 2012.6.1