[other]
/ 2019
/ Joint Publication 3-12, Cyberspace Operations
[web]
Whitehouse.gov
/ 2009
/ The National Cyber Range
/ Whitehouse
/ https://obamawhitehouse.archives.gov/files/documents/cyber/DARPA-NationalCyberRange_FactSheet.pdf
[journal]
김대식
/ 2017
/
A Study of Administration of Cyber Range
/ 인터넷정보학회논문지
/ 한국인터넷정보학회
18(5)
: 9~15
/ 10.7472/jksii.2017.18.5.09
[journal]
강용구
/ 2020
/
Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling
/ 한국컴퓨터정보학회논문지
/ 한국컴퓨터정보학회
25(3)
: 65~72
/ https://doi.org/10.9708/jksci.2020.25.03.065
[confproc]
H. Y. Lee
/ 2018
/ Generation of Random Virtual Environments for Cyber Kill Chain Training
/ The Korea Society For Simulation
: 15~18
[confproc]
Z. C. Schreuders
/ 2017
/ Security Scenario Generator(SecGen) : A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events
/ 2017 USENIX$ Workshop on Advances in Security Education (ASE)
[confproc]
W. Feng
/ 2015
/ A Scaffolded, Metamorphic CTF for Reverse Engineering
/ 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE)
[confproc]
J. Burket
/ 2015
/ Automatic problem generation for capture-the-flag competitions
/ 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE)
[web]
DuDuIT
/ Cyber-hacking response training system
/ http://duduit.co.kr
[other]
Y. S. Park
/ 2020
/ Virtualization-based training content delivery system. Kor. Patent No. 10-2020-0023934
[confproc]
J. Park
/ 2019
/ Scenario-based Cyber Attack / Defense Education System Using Virtual Machine
/ 2019 Korean Society For Internet Information Conference
[journal]
문대성
/ 2014
/
Host based Feature Description Method for Detecting APT Attack
/ 정보보호학회논문지
/ 한국정보보호학회
24(5)
: 839~850
/ http://dx.doi.org/10.13089/JKIISC.2014.24.5.839
[confproc]
S. Nam
/ 2019
/ Virtual training system for checking user account and detecting unauthorized account access to counter cyber attacks
/ 2019 Korea Convergence Security Association Conference
[book]
S. M. Nam
/ 2020
/ Cyber Security Simulated Training System and Cyber Aegis
/ Bookk
[confproc]
J. Noh
/ 2019
/ Automated Classification by Efficient Learner Level based on Machine Learning
/ 2019Korean Society for Internet Information Conference
[journal]
R. Babuška
/ 1996
/ Fuzzy systems, modeling and identification
/ Delft Univ. Technol. Dep. Electr. Eng. Control Lab. Mekelweg
4
[confproc]
S. H. Chi
/ 2006
/ Fuzzy logic based propagation limiting method for message routing in wireless sensor networks
/ International Conference on Computational Science and Its Applications
: 58~67