소프트웨어 생명주기 단계별 사이버보안 평가 방법론 제안
Vol. 25, No. 2, pp. 363-374,
4월.
2015
10.13089/JKIISC.2015.25.2.363, Full Text:
Keywords: software development life cycle, cyber security assessment, cyber security in nuclear power plants
Abstract Statistics
Cite this article
10.13089/JKIISC.2015.25.2.363, Full Text:
Keywords: software development life cycle, cyber security assessment, cyber security in nuclear power plants
Abstract Statistics
Cite this article
[IEEE Style]
D. Seo, K. Cha, Y. Shin, C. Jeong, Y. Kim, "Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle," Journal of The Korea Institute of Information Security and Cryptology, vol. 25, no. 2, pp. 363-374, 2015. DOI: 10.13089/JKIISC.2015.25.2.363.
[ACM Style]
Dal-Mi Seo, Ki-Jong Cha, Yo-Soon Shin, Choong-Heui Jeong, and Young-Mi Kim. 2015. Assessment Method of Step-by-Step Cyber Security in the Software Development Life Cycle. Journal of The Korea Institute of Information Security and Cryptology, 25, 2, (2015), 363-374. DOI: 10.13089/JKIISC.2015.25.2.363.