参考文献
[1]SLAY J,MILLER M.Lessons Learned from the Maroochy Water Breach[M]//GOETZ E,SHENOI S.Critical Infrastructure Protection.Berlin,Germany:Springer,2007:73-82.
[2]CONTIJ P.The Day the Samba Stopped[J].Engineering & Technology,2010,5(4):46-47.
[3]KUVSHINKOVA S.SQL Slammer Worm Lessons Learned for Consideration by the Electricity Sector[Z].Atlanta,USA:North American Electric Reliability Council,2003.
[4]FARWELL J P,ROHOZINSKI R.Stuxnet and the Future of Cyber War[J].Survival,2011,53(1):23-40.
[5]王小山,杨安,石志强,等.工业控制系统信息安全新趋势[J].信息网络安全,2015(1):6-11.
[6]李鸿培,忽朝俭,王晓鹏.2014工业控制系统的安全研究与实践[J].计算机安全,2014(5):36-59.
[7]IGURE V M,LAUGHTER S A,WILLIAMS R D.Security Issues in SCADA Networks[J].Computers & Security,2006,25(7):498-506.
[8]卢慧康,陈冬青,彭勇,等.工业控制系统信息安全风险评估量化研究[J].自动化仪表,2014,35(10):21-25.
[9]周小锋,陈秀真.面向工业控制系统的灰色层次信息安全评估模型[J].信息网络安全,2014(1):15-20.
[10]任帅,慕德俊,朱灵波,等.一种基于灰色层次分析法的信息安全评估模型[J].计算机应用,2006,26(9):2111-2113.
[11]KIM J,TONG Lang.On Topology Attack of a Smart Grid:Undetectable Attacks and Countermeasures[J].IEEE Journal on Selected Areas in Communications,2013,31(7):1294-1305.
[12]VUKOVIC' O,SOU K C,DN G,et al.Network-layer Protection Schemes Against Stealth Attacks on State Estimators in Power Systems[C]//Proceedings of 2011 IEEE International Conference on Smart Grid Com-munications.Washington D.C.,USA:IEEE Press,2011:184-189.
[13]TEIXEIRA A,AMIN S,SANDBERG H,et al.Cyber Security Analysis of State Estimators in Electric Power Systems[C]//Proceedings of the 49th IEEE Conference on Decision and Control.Washington D.C.,USA:IEEE Press,2010:5991-5998.
[14]FAWZI H,TABUADA P,DIGGAVI S.Security for Control Systems Under Sensor and Actuator Attacks[C]//Proceedings of the 51st IEEE Conference on Decision and Control.Washington D.C.,USA:IEEE Press,2012:3412-3417.
[15]HENDRICKX J M,JOHANSSON K H,JUNGERS R M,et al.Efficient Computations of a Security Index for False Data Attacks in Power Networks[J].IEEE Transactions on Automatic Control,2012,59(12):3194-3208.
[16]LIU Yao,NING Peng,REITER M K.False Data Injection Attacks Against State Estimation in Electric Power Grids[J].ACM Transactions on Information and System Security,2009,14(1):21-32.
[17]JAEGER T,SAILER R,SREENIVASAN Y.Managing the Risk of Covert Information Flows in Virtual Machine Systems[C]//Proceedings of SACMAT’07.New York,USA:ACM Press,2007:81-90.
编辑金胡考 |