You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Correction
  • Open Access

12 December 2023

Correction: Youn et al. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142

,
,
,
,
and
1
Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea
2
Cyber Operations Center, Republic of Korea Army (ROKA), Gyeryong 32800, Republic of Korea
3
Department of Convergence Engineering for Intelligent Drones, Sejong University, Seoul 05006, Republic of Korea
4
Department of Military Digital Convergence, Ajou University, Suwon 16499, Republic of Korea
This article belongs to the Special Issue Advances in Software Security
There was an error in the original publication [1]. The authors have not cited Figures 7 and 8, accordingly. Concerns were raised on this matter, and the citation issue was addressed; thus, reference [40] was added as follows:
  • [40] Go, W. Technology to Attack groups identify based on cyber-attack life-cycle information learning. In Proceedings of the 2th Artificial Intelligence Information Security Conference 2022 (AIS 2022), Dailysecu, Seoul, Republic of Korea, 15 November 2022; pp. 9–10.
Thus, the following changes were made to the paper:
(1)
Amendment of references (p. 14) before (Figure 7 [18]) and after (Figure 7 [40]);
(2)
Amendment of references (p. 15) before (Figure 8) and after (Figure 8 [40]);
(3)
Figure 7 (pp. 14): Add figure citation and permission phrase;
(Adapted from Go et al. Proc AIS 2022; p. 9, with permission from Dailysecu Press [40].)
(4)
Figure 8 (pp. 15): Add figure citation and permission phrase.
(Adapted from Go et al. Proc AIS 2022; p. 10, with permission from Dailysecu Press [40].)

Reference

  1. Youn, J.; Kim, K.; Kang, D.; Lee, J.; Park, M.; Shin, D. Research on Cyber ISR Visualization Method Based on BGP Archive Data through Hacking Case Analysis of North Korean Cyber-Attack Groups. Electronics 2022, 11, 4142. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.