[1] |
STOUFFER K, FALCO J, SCARFONE K.Guide to Industrial Control Systems (ICS) Security[R]. National Institute of Standards & Technology, SP 800-82, 2011.
|
[2] |
邢栩嘉,林闯,蒋屹新. 计算机系统脆弱性评估研究[J]. 计算机学报, 2004,27(1):1-11.
|
[3] |
夏春明,刘涛,王华忠,等. 工业控制系统信息安全现状及发展趋势[J]. 信息安全与技术, 2013(2):13-18.
|
[4] |
SONG H, FINK G, JESCHKE S. Security and privacy in cyber-physical systems:foundations, principles and applications[M]// Security and Privacy in Cyber-Physical Systems. Wiley, 2017:305-326.
|
[5] |
NI M, MCCALLEY J D, VITTAL V, et al. Online risk-based security assessment[J]. IEEE Transactions on Power System, 2003,18(1):258-265.
|
[6] |
SCHNEIER B. Attack trees: Modeling security threats[J]. Doctor Dobb’s Journal, 1999,24(12):21-29.
|
[7] |
SHEYNER 0, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs[C]// Proceedings of the 2002 IEEE Symposium on Security and Privacy. 2002:273-284.
|
[8] |
POOLSAPPASIT N, DEWRI R, RAY I. Dynamic Security Risk Management Using Bayesian Attack Graphs[M]. IEEE Computer Society Press, 2012.
|
[9] |
刘文芬,张树伟,龚心. 一种优化的基于Markov博弈理论的网络风险评估方法[J]. 电信科学, 2014,30(7):13-18.
|
[10] |
林云威,陈冬青,彭勇,等. 基于D-S证据理论的电厂工业控制系统信息安全风险评估[J]. 华东理工大学学报(自然科学版), 2014,40(4):500-505.
|
[11] |
常昊,秦元庆,周纯杰. 基于贝叶斯攻击图的工控系统动态风险评估[J]. 信息技术, 2018,42(10):70-75.
|
[12] |
董静. 改进的HMM网络安全风险评估方法研究[D]. 武汉:华中科技大学, 2008.
|
[13] |
黄慧萍,肖世德,孟祥印. 基于攻击树的工业控制系统信息安全风险评估[J]. 计算机应用研究, 2015,32(10):3022-3025.
|
[14] |
张永铮,方滨兴,迟悦,等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007,30(2):234-240.
|
[15] |
胡浩,刘玉岭,张玉臣,等. 基于攻击图的网络安全度量研究综述[J]. 网络与信息安全学报, 2018,4(9):5-20.
|
[16] |
DACIER M, DESWARTE Y. Privilege graph: an extension to the typed access matrix model[C]// The 3rd European Symposium on Research in Computer Security(ESORICS 94). 1994:319-334.
|
[17] |
龚斯谛. 基于AHP和攻击图的工控系统信息安全风险评估研究[D]. 南昌:南昌航空大学, 2017.
|
[18] |
ELLSON J, GANSNER E R, KOUTSOFIOS L, et al. Graphviz - open source graph drawing tools[J]. Lecture Notes in Computer Science, 2002,2265:483-484.
|
[19] |
ARNES A, VALEUR F, VIGNA G, et al. Using hidden Markov models to evaluate the risk of intrusions[C]// Proceedings of the RAID’06. 2006:145-164.
|
[20] |
AMES A, VALEUR F, VIGNA G, et al. Using hidden markov models to evaluate the risks of intrusions[C]// Recent Advances in Intrusion Detection. Springer, 2006:145-164.
|