Abstract
I. INTRODUCTION
II. RELATAED RESEARCH
III. PROPOSED FRAMEWORK
A. Overview
B. Evaluation Items
C. Step 1: Discussion of Plan for Exercise and Evaluation
D. Step 2: Creation and Evaluation of Cyber Attack Scenario for Exercise
IV. EVALUATION
A. Comparative Study
B. Case Study
V. CONCLUSION
ACKNOWLEDGMENT
REFERENCES