[1] ALGULIYEV R,IMAMVERDIYEV Y,SUKHOSTAT L.Cyber-physical systems and their security issues[J].Computers in Industry,2018,100:212-223. [2] PAL R,PRASANNA V.The STREAM mechanism for CPS security:the case of the smart grid[J].IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,2016,36(4):537-550. [3] BOLBOT V,THEOTOKATOS G,BUJORIANU M L,et al.Vulnerabilities and safety assurance methods in cyber-physical systems:a comprehensive review[J].Reliability Engineering & System Safety,2018,182:179-193. [4] LIU Ting,TIAN Jue,WANG Jiazhou,et al.Integrated security threats and defense of cyber-physical systems[J].Acta Automatica Sinica,2019,45(1):5-24.(in Chinese)刘烃,田决,王稼舟,等.信息物理融合系统综合安全威胁与防御研究[J].自动化学报,2019,45(1):5-24. [5] SCHNEIER B.Attack trees[J].Dr.Dobb's Journal,1999,24(12):21-29. [6] KORDY B,MAUW S,RADOMIROVIC' S,et al.Foundations of attack-defense trees[C]//Proceedings of International Workshop on Formal Aspects in Security and Trust.Berlin,Germany:Springer,2010:80-95. [7] ROY A,KIM D S,TRIVEDI K S.Cyber security analysis using attack countermeasure trees[C]//Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research.New York,USA:ACM Press,2010:1-4. [8] WANG Ping,LIU Jiachi.Improvements of attack-defense trees for threat analysis[M]//PAN J S,YANG C N,LIN C C.Advances in Intelligent Systems and Applications-Volume 2.Berlin,Germany:Springer,2013:91-100. [9] ROY A,KIM D S,TRIVEDI K S.Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees[C]//Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2012:1-12. [10] HUANG Huiping,XIAO Shide,MENG Xiangyin.Cyber security assessment for SCADA systems based on attack-defense game model[J].Computer Engineering and Science,2017,39(5):877-884.(in Chinese)黄慧萍,肖世德,孟祥印.基于攻防博弈的SCADA系统信息安全评估方法[J].计算机工程与科学,2017,39(5):877-884. [11] WANG Huazhong.Supervisory Control and Data Acquisition(SCADA) system and its applications[M].Beijing:Electronics Industry Press,2012.(in Chinese)王华忠.监控与数据采集(SCADA)系统及其应用[M].北京:电子工业出版社,2012. [12] CHAKRABORTY N,KALAIMANNAN E.Minimum cost security measurements for attack tree based threat models in smart grid[C]//Proceedings of the 8th Annual Ubiquitous Computing,Electronics and Mobile Communication Conference.Washington D.C.,USA:IEEE Press,2017:614-618. [13] MAUW S,OOSTDIJK M.Foundations of attack trees[C]//Proceedings of International Conference on Information Security and Cryptology.Berlin,Germany:Springer,2005:186-198. [14] HUANG Huiping,XIAO Shide,LIANG Hongqin.Vulnerability assessment of cyber security for SCADA systems based on AHP and attack defense tree[J].Control Engineering of China,2018,25(6):1091-1097.(in Chinese)黄慧萍,肖世德,梁红琴.基于AHP和攻防树的SCADA系统安全脆弱性评估[J].控制工程,2018,25(6):1091-1097. [15] HUANG Huiping,XIAO Shide,LIANG Hongqin,et al.Attack-defense trees based cyber security analysis for CPSs[C]//Proceedings of the 17th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Washington D.C.,USA:IEEE Press,2016:693-698. [16] SUN Wenjun,SU Yang.Risk analysis method for advanced persistent threat based on attack-defense trees[J].Application Research of Computers,2018,35(2):511-514,551.(in Chinese)孙文君,苏旸.基于攻防树的APT风险分析方法[J].计算机应用研究,2018,35(2):511-514,551. [17] FU Yu,YU Yihan,CHEN Yongqiang,et al.Network security analysis on attack-defense behavior tree[J].Advance Engineering Sciences,2017,49(2):115-120.(in Chinese)付钰,俞艺涵,陈永强,等.基于攻防行为树的网络安全态势分析[J].工程科学与技术,2017,49(2):115-120. [18] ASLANYAN Z,NIELSON F,PARKER D.Quantitative verification and synthesis of attack-defence scenarios[C]//Proceedings of the 29th Computer Security Foundations Symposium.Washington D.C.,USA:IEEE Press,2016:105-119. [19] FEI Yu,NING Jing,JIANG Wenbao.A quantifiable attack-defense trees model for APT attack[C]//Proceedings of the 3rd Advanced Information Technology,Electronic and Automation Control Conference.Washington D.C.,USA:IEEE Press,2018:2303-2306. [20] DING Ming,LI Xiaojing,ZHANG Jingjing,et al.Effect of SCADA-oriented cyber attack on power system reliability[J].Power System Protection and Control,2018,46(11):37-45.(in Chinese)丁明,李晓静,张晶晶,等.面向SCADA的网络攻击对电力系统可靠性的影响[J].电力系统保护与控制,2018,46(11):37-45. [21] KORDY B,KORDY P,MAUW S,et al.ADTool:security analysis with attack-defense trees[C]//Proceedings of International Conference on Quantitative Evaluation of Systems.Berlin,Germany:Springer,2013:173-176. |