Next Article in Journal
A Review of Homography Estimation: Advances and Challenges
Previous Article in Journal
One-Dimensional Quaternion Discrete Fourier Transform and an Approach to Its Fast Computation
Previous Article in Special Issue
Toward a Comprehensive Framework for Ensuring Security and Privacy in Artificial Intelligence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Correction

Correction: Youn et al. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142

1
Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea
2
Cyber Operations Center, Republic of Korea Army (ROKA), Gyeryong 32800, Republic of Korea
3
Department of Convergence Engineering for Intelligent Drones, Sejong University, Seoul 05006, Republic of Korea
4
Department of Military Digital Convergence, Ajou University, Suwon 16499, Republic of Korea
5
Korea Internet & Security Agency (KISA), Naju 58324, Republic of Korea
6
The 2nd R&D Institute 3rd Directorate, Agency for Defense Development (ADD), Seoul 05661, Republic of Korea
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(24), 4975; https://doi.org/10.3390/electronics12244975
Submission received: 22 November 2023 / Accepted: 27 November 2023 / Published: 12 December 2023
(This article belongs to the Special Issue Advances in Software Security)
There was an error in the original publication [1]. The authors have not cited Figures 7 and 8, accordingly. Concerns were raised on this matter, and the citation issue was addressed; thus, reference [40] was added as follows:
  • [40] Go, W. Technology to Attack groups identify based on cyber-attack life-cycle information learning. In Proceedings of the 2th Artificial Intelligence Information Security Conference 2022 (AIS 2022), Dailysecu, Seoul, Republic of Korea, 15 November 2022; pp. 9–10.
Thus, the following changes were made to the paper:
(1)
Amendment of references (p. 14) before (Figure 7 [18]) and after (Figure 7 [40]);
(2)
Amendment of references (p. 15) before (Figure 8) and after (Figure 8 [40]);
(3)
Figure 7 (pp. 14): Add figure citation and permission phrase;
(Adapted from Go et al. Proc AIS 2022; p. 9, with permission from Dailysecu Press [40].)
(4)
Figure 8 (pp. 15): Add figure citation and permission phrase.
(Adapted from Go et al. Proc AIS 2022; p. 10, with permission from Dailysecu Press [40].)

Reference

  1. Youn, J.; Kim, K.; Kang, D.; Lee, J.; Park, M.; Shin, D. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Youn, J.; Kim, K.; Kang, D.; Lee, J.; Park, M.; Shin, D. Correction: Youn et al. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142. Electronics 2023, 12, 4975. https://doi.org/10.3390/electronics12244975

AMA Style

Youn J, Kim K, Kang D, Lee J, Park M, Shin D. Correction: Youn et al. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142. Electronics. 2023; 12(24):4975. https://doi.org/10.3390/electronics12244975

Chicago/Turabian Style

Youn, Jaepil, Kookjin Kim, Daeyoung Kang, Jaeil Lee, Moosung Park, and Dongkyoo Shin. 2023. "Correction: Youn et al. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142" Electronics 12, no. 24: 4975. https://doi.org/10.3390/electronics12244975

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop