References
- Myung Kil Ahn, Yong Hyun Kim, "Research on System Architecture and Simulation Environment for Cyber Warrior Training," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 533-540, 2016. https://doi.org/10.13089/JKIISC.2016.26.2.533
- B. Ferguson, A. Tall, and D. Olsen, "National Cyber Range Overview," Proceedings of the 2014 IEEE Military Communications Conference, MILCOM '14, pp. 123-128, Oct. 2014.
- T. Bonaci and J. Herron and T. YusufTo, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics," National Science Foundation, CNS-1329751, pp. 1-11, May 2015.
- SHIVAYOGIMATH, Chaitra N., "An Overview of Network Penetration Testing," International Journal of Research in Engineering and Technology, Vol. 3, No. 3, pp. 408-413, 2014.
- Rossey, L. M., Cunningham, R. K., Fried, D. J., Rabek, J. C., Lippmann, R. P., Haines, J. W., & Zissman, M. A. "Lariat: Lincoln Adaptable Real-Time Information Assurance Testbed," In Proceedings, IEEE Aerospace Conference Vol. 6, pp. 6-6, March, 2002.
- Applebaum, A., Miller, D., Strom, B., Korban, C., & Wolf, R. "Intelligent, Automated Red Team Emulation," In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACM, pp. 363-373, December, 2016.
-
Strom, B. E., Applebaum, A., Miller, D. P., Nickels, K. C., Pennington, A. G., & Thomas, C. B., "MITRE
$ATT&CK^{TM}$ : Design and Philosophy," Technical Report, 2018. - Len Bass, Paul Clements, Rick Kazman, "Software Architecture in Practice," Addison-Wesley Professional, America, 2012.
- Lloyd Wihl, "Training for the Combined Cyber / Kinetic Battlefield," In Proceedings of MODSIM World 2015. No. 9, pp. 1-11, March, 2015.