There was an error in the original publication [1]. The authors have not cited Figures 7 and 8, accordingly. Concerns were raised on this matter, and the citation issue was addressed; thus, reference [40] was added as follows:
- [40] Go, W. Technology to Attack groups identify based on cyber-attack life-cycle information learning. In Proceedings of the 2th Artificial Intelligence Information Security Conference 2022 (AIS 2022), Dailysecu, Seoul, Republic of Korea, 15 November 2022; pp. 9–10.
Thus, the following changes were made to the paper:
- (1)
- Amendment of references (p. 14) before (Figure 7 [18]) and after (Figure 7 [40]);
- (2)
- Amendment of references (p. 15) before (Figure 8) and after (Figure 8 [40]);
- (3)
- Figure 7 (pp. 14): Add figure citation and permission phrase;
(Adapted from Go et al. Proc AIS 2022; p. 9, with permission from Dailysecu Press [40].)
- (4)
- Figure 8 (pp. 15): Add figure citation and permission phrase.
(Adapted from Go et al. Proc AIS 2022; p. 10, with permission from Dailysecu Press [40].)
Reference
- Youn, J.; Kim, K.; Kang, D.; Lee, J.; Park, M.; Shin, D. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).