1 박근석, "전장에서 드론을 활용한 보안 위협과 시나리오" 한국융합보안학회 18 (18): 73-79, 2018
2 "국토교통부훈령 제872호 2017.6.5. 타법개정, 무인 항공기 비행안전 제고를 위한 입법·정책 과제"
3 Shostack, Adam, "Threat modeling: Designing for security" John Wiley & Sons 2014
4 "Protection Profiles CCV files"
5 Low Cost, "Phrack issue 0x3c(60), article 13"
6 Potter, Bruce, "Microsoft SDL threat modelling tool" 2009 (2009): 15-18, 2009
7 Rodday, N. M., "Exploring security vulnerabilities of unmanned aerial vehicles" IEEE 993-994, 2016
8 Shostack, Adam, "Experiences Threat Modeling at Microsoft"
9 "DoDI 8500.2"
10 J. Warner, "A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable to Spoofing" 25 : 5-8, 2002
1 박근석, "전장에서 드론을 활용한 보안 위협과 시나리오" 한국융합보안학회 18 (18): 73-79, 2018
2 "국토교통부훈령 제872호 2017.6.5. 타법개정, 무인 항공기 비행안전 제고를 위한 입법·정책 과제"
3 Shostack, Adam, "Threat modeling: Designing for security" John Wiley & Sons 2014
4 "Protection Profiles CCV files"
5 Low Cost, "Phrack issue 0x3c(60), article 13"
6 Potter, Bruce, "Microsoft SDL threat modelling tool" 2009 (2009): 15-18, 2009
7 Rodday, N. M., "Exploring security vulnerabilities of unmanned aerial vehicles" IEEE 993-994, 2016
8 Shostack, Adam, "Experiences Threat Modeling at Microsoft"
9 "DoDI 8500.2"
10 J. Warner, "A Simple Demonstration That the Global Positioning System (GPS) is Vulnerable to Spoofing" 25 : 5-8, 2002
11 이영욱, "4차 산업혁명시대 우리나라 드론의 발전 방향" 한국융합보안학회 18 (18): 3-10, 2018