[1] STOUFFER K, FALCO J, SCARFONE K.Guide to Industrial Control Systems (ICS) Security[R]. National Institute of Standards & Technology, SP 800-82, 2011.
[2] 邢栩嘉,林闯,蒋屹新. 计算机系统脆弱性评估研究[J]. 计算机学报, 2004,27(1):1-11.
[3] 夏春明,刘涛,王华忠,等. 工业控制系统信息安全现状及发展趋势[J]. 信息安全与技术, 2013(2):13-18.
[4] SONG H, FINK G, JESCHKE S. Security and privacy in cyber-physical systems:foundations, principles and applications[M]// Security and Privacy in Cyber-Physical Systems. Wiley, 2017:305-326.
[5] NI M, MCCALLEY J D, VITTAL V, et al. Online risk-based security assessment[J]. IEEE Transactions on Power System, 2003,18(1):258-265.
[6] SCHNEIER B. Attack trees: Modeling security threats[J]. Doctor Dobb’s Journal, 1999,24(12):21-29.
[7] SHEYNER 0, HAINES J, JHA S, et al. Automated generation and analysis of attack graphs[C]// Proceedings of the 2002 IEEE Symposium on Security and Privacy. 2002:273-284.
[8] POOLSAPPASIT N, DEWRI R, RAY I. Dynamic Security Risk Management Using Bayesian Attack Graphs[M]. IEEE Computer Society Press, 2012.
[9] 刘文芬,张树伟,龚心. 一种优化的基于Markov博弈理论的网络风险评估方法[J]. 电信科学, 2014,30(7):13-18.
[10]林云威,陈冬青,彭勇,等. 基于D-S证据理论的电厂工业控制系统信息安全风险评估[J]. 华东理工大学学报(自然科学版), 2014,40(4):500-505.
[11]常昊,秦元庆,周纯杰. 基于贝叶斯攻击图的工控系统动态风险评估[J]. 信息技术, 2018,42(10):70-75.
[12]董静. 改进的HMM网络安全风险评估方法研究[D]. 武汉:华中科技大学, 2008.
[13]黄慧萍,肖世德,孟祥印. 基于攻击树的工业控制系统信息安全风险评估[J]. 计算机应用研究, 2015,32(10):3022-3025.
[14]张永铮,方滨兴,迟悦,等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007,30(2):234-240.
[15]胡浩,刘玉岭,张玉臣,等. 基于攻击图的网络安全度量研究综述[J]. 网络与信息安全学报, 2018,4(9):5-20.
[16]DACIER M, DESWARTE Y. Privilege graph: an extension to the typed access matrix model[C]// The 3rd European Symposium on Research in Computer Security(ESORICS 94). 1994:319-334.
[17]龚斯谛. 基于AHP和攻击图的工控系统信息安全风险评估研究[D]. 南昌:南昌航空大学, 2017.
[18]ELLSON J, GANSNER E R, KOUTSOFIOS L, et al. Graphviz - open source graph drawing tools[J]. Lecture Notes in Computer Science, 2002,2265:483-484.
[19]ARNES A, VALEUR F, VIGNA G, et al. Using hidden Markov models to evaluate the risk of intrusions[C]// Proceedings of the RAID’06. 2006:145-164.
[20]AMES A, VALEUR F, VIGNA G, et al. Using hidden markov models to evaluate the risks of intrusions[C]// Recent Advances in Intrusion Detection. Springer, 2006:145-164.
|