Acknowledgement
Supported by : 국방과학연구소
References
- FIRST.org, Inc., Common Vulnerability Scoring System (CVSS-SIG) [Online]. Available: https://www.first.org/cvss/cvss-v30-specification-v1.7.pdf (downloaded 2017, May. 25)
- A. D'Amico, L. Buchanan, J. Goodall, and P. Walczak, "Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users," International Conference on Information Warfare and Security, p. 388, Academic Conferences International Limited, 2010.
- G. Jakobson, "Mission cyber security situation assessment using impact dependency graphs," Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, pp. 1-8, IEEE, 2011.
- J. Holsopple and S. J. Yang, "Handling temporal and functional changes for mission impact assessment," Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2013 IEEE International Multi-Disciplinary Conference on, pp. 212-219, IEEE, 2013.
- A. Kott, C. Wang, and R. F. Erbacher, Cyber defense and situational awareness. Springer, 2014.
- S. Musman, A. Temin, M. Tanner, D. Fox, and B. Pridemore, "Evaluating the impact of cyber attacks on missions," International Conference on Cyber Warfare and Security, p. 446, Academic Conferences International Limited, 2010.
- D. W. Franzen, "A bayesian decision model for battle damage assessment," tech. rep., DTIC Document, 1999.
- J. G. Diehl and C. E. Sloan, "Battle damage assessment: The ground truth," tech. rep., DTIC Document, 2005.
- L. Fortson and M. Grimaila, "Development of a defensive cyber damage assessment framework," ICIW, p. 69, 2007.
- Yong-Bok Lee, Yong-Heup Kim and Jae-Yeong Lee, "A proposal of new MOE to assess the combat power synergistic effect of warfare information system," Korean Operations Research and Management Science Society 2008 Fall Conference, pp. 104-112, Oct. 2008.