참고문헌
- Yaacoub, J., Salman, O., Noura, H., Kaaniche, N., Chehab, A. & Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocessors And Microsystems. 77 pp. 103201 (2020)
- Ding, D., Han, Q., Xiang, Y., Ge, X. & Zhang, X. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing. 275 pp. 1674-1683 (2018) https://doi.org/10.1016/j.neucom.2017.10.009
- Mellado, D., Fernandez-Medina, E. & Piattini, M. Applying a security requirements engineering process. Computer Security-ESORICS 2006: 11th European Symposium On Research In Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings 11. pp. 192-206 (2006)
- Schneble, W. & Thamilarasu, G. Attack detection using federated learning in medical cyber-physical systems. Proc. 28th Int. Conf. Comput. Commun. Netw. (ICCCN). 29 pp. 1-8 (2019)
- Munante, D., Chiprianov, V., Gallon, L. & Aniorte, P. A review of security requirements engineering methods with respect to risk analysis and model-driven engineering. Availability, Reliability, And Security In Information Systems: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 And 4th International Workshop On Security And Cognitive Informatics For Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings 9. pp. 79-93 (2014)
- Sirohi, P., Agarwal, A. & Tyagi, S. A comprehensive study on security attacks on SSL/TLS protocol. 2016 2nd International Conference On Next Generation Computing Technologies (NGCT). pp. 893-898 (2016)
- Gao, Y., Peng, Y., Xie, F., Zhao, W., Wang, D., Han, X., Lu, T. & Li, Z. Analysis of security threats and vulnerability for cyber-physical systems. Proceedings Of 2013 3rd International Conference On Computer Science And Network Technology. pp. 50-55 (2013)
- Fabian, B., Gurses, S., Heisel, M., Santen, T. & Schmidt, H. A comparison of security requirements engineering methods. Requirements Engineering. 15 pp. 7-40 (2010) https://doi.org/10.1007/s00766-009-0092-x
- Ross, R. & Johnson, L. Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach. (Ronald S. Ross, L A. Johnson, 2010)
- Griffor, E., Greer, C., Wollman, D. & Burns, M. Framework for cyber-physical systems: Volume 2, working group reports. (Edward R. Griffor, Christopher Greer, David A. Wollman, Martin J. Burns,2017)
- Force, J. Risk management framework for information systems and organizations. NIST Special Publication. 800 pp. 37 (2018)
- Peng, Y., Lu, T., Liu, J., Gao, Y., Guo, X. & Xie, F. Cyber-physical system risk assessment. 2013 Ninth International Conference On Intelligent Information Hiding And Multimedia Signal Processing. pp. 442-447 (2013)
- Rehman, S., Allgaier, C. & Gruhn, V. Security requirements engineering: A framework for cyber-physical systems. 2018 International Conference On Frontiers Of Information Technology (FIT). pp. 315-320 (2018)
- Rehman, S. & Gruhn, V. An effective security requirements engineering framework for cyber-physical systems. Technologies. 6, 65 (2018)
- Japs, S. Security safety by model-based requirements engineering. 2020 IEEE 28th International Requirements Engineering Conference (RE). pp. 422-427 (2020)
- Asplund, F., McDermid, J., Oates, R. & Roberts, J. Rapid integration of CPS security and safety. IEEE Embedded Systems Letters. 11, 111-114 (2018)
- Jurjens, J. Towards development of secure systems using UMLsec. International Conference On Fundamental Approaches To Software Engineering. pp. 187-200 (2001
- Jurjens, J. UMLsec: Extending UML for secure systems development. International Conference On The Unified Modeling Language. pp. 412-425 (2002)
- Best, B., Jurjens, J. & Nuseibeh, B. Model-based security engineering of distributed information systems using UMLsec. 29th International Conference On Software Engineering (ICSE'07). pp. 581-590 (2007)
- Jurjens, J. & Shabalin, P. Automated verification of UMLsec models for security requirements. International Conference On The Unified Modeling Language. pp. 365-379 (2004)
- Ruiz, J., Arjona, M., Mana, A. & Rudolph, C. Security knowledge representation artifacts for creating secure IT systems. Computers Security. 64 pp. 69-91 (2017) https://doi.org/10.1016/j.cose.2016.09.001
- Gregoire, J., Buyens, K., De Win, B., Scandariato, R. & Joosen, W. On the secure software development process: CLASP and SDL compared. Third International Workshop On Software Engineering For Secure Systems (SESS'07: ICSE Workshops 2007). pp. 1-1 (2007)
- Ansari, M., Pandey, D. & Alenezi, M. STORE: Security threat-oriented requirements engineering methodology. Journal Of King Saud University-Computer And Information Sciences. 34, 191-203 (2022) https://doi.org/10.1016/j.jksuci.2018.12.005
- Khan, R., Khan, S., Khan, H. & Ilyas, M. Systematic mapping study on security approaches in secure software engineering. Ieee Access. 9 pp. 19139-19160 (2021) https://doi.org/10.1109/ACCESS.2021.3052311
- Mead, N. & Stehney, T. Security quality requirements engineering (SQUARE) methodology. ACM SIGSOFT Software Engineering Notes. 30, 1-7 (2005) https://doi.org/10.1145/1082983.1083214
- Suleiman, H. & Svetinovic, D. Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure. Requirements Engineering. 18 pp. 251-279 (2013) https://doi.org/10.1007/s00766-012-0153-4
- Viega, J. Building security requirements with CLASP. ACM SIGSOFT Software Engineering Notes. 30, 1-7 (2005) 631
- Dey, N., Ashour, A., Shi, F., Fong, S. & Tavares, J. Medical cyber-physical systems: A survey. Journal Of Medical Systems. 42 pp. 1-13 (2018). https://doi.org/10.1007/s10916-017-0844-y