[journal]
홍수연
/ 2019
/
The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training
/ 한국군사과학기술학회지
/ 한국군사과학기술학회
22(6)
: 797~805
/ https://doi.org/10.9766/KIMST.2019.22.6.797
[confproc]
Hyunjin Lee
/ 2019
/ Method for Cyber Attack Scenario Composition using MITRE ATT&CK
/ Annual Conference of IEIE 2020
42
: 1103~1104
[report]
D. H Kim
/ 2017
/ Software Design Description(SDD) for LVT of Cyber warfare Modeling Technology using LVC(CMT)
/ Agency for Defense Development
: 314~
[report]
Strom, B. E.
/ 2018
/ Mitre att&ck: Design and philosophy. Technical report
[web]
/ ATT&CK framework
/ https://attack.mitre.org/
[web]
/ Cyber attack group
/ https://attack.mitre.org/groups/
[other]
Cross, J.
/ 2016
/ Operation Dust Storm
[other]
Bruskin S.
/ 2020
/ SoK : A Survey of Open Source Threat Emulators
/ arxiv preprint arXiv:2003.01518
[web]
/ Red Team Automation
/ https://github.com/endgameinc/RTA
[journal]
Lee, J.Y.
/ 2020
/ Technological Trends in Cyber Attack Simulations
/ Electronics and Telecommunications Trends
35(1)
: 34~48
[confproc]
Andy Applebaum
/ 2016
/ Intelligent, Automated Red Team Emulation
/ Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC ‘16
: 363~373
[web]
/ Atomic Red Team
/ https://atomicredteam.io/
[confproc]
Ferguson, Bernard
/ 2014
/ National cyber range overview
/ 2014 IEEE Military Communications Conference
/ IEEE
: 123~128
[confproc]
Pham, Cuong
/ 2016
/ Cyris: A cyber range instantiation system for facilitating security training
/ Proceedings of the Seventh Symposium on Information and Communication Technology
: 251~258
[journal]
Yoo, J. D.
/ 2020
/ Cyber Attack and Defense Emulation Agents
/ Applied Sciences
10(6)
: 2140~
[web]
/ AttackIQ
/ https://attackiq.com/
[web]
/ Cymulate
/ https://cymulate.com/