自动化技术、通信工程 |
|
|
|
|
广义收益信息物理系统脆弱性评估方法 |
黄家辉, 冯冬芹 |
浙江大学 控制科学与工程学院,浙江 杭州 310027 |
|
Method for vulnerability evaluation of Cyberphysical system based on generalized profit |
HUANG Jia hui, FENG Dong qin |
State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China |
[1] VENKATASUBRAMANIAN K K. Security solutions for Cyberphysical systems [D]. Phoenix: Arizona State University, 2009.
[2] LAPRIE J C, KANOUN K, KANICHE M. Modelling interdependencies between the electricity and information infrastructures [J]. Lecture Notes in Computer Science, 2008, 4680: 54-67.
[3] VALENTE J, BARRETO C, CRDENAS A A. Cyberphysical systems attestation [C]∥ IEEE International Conference on Distributed Computing in Sensor Systems. Marina Del Rey: IEEE, 2014: 354-357.
[4] SWILER L P, PHILLIPS C, GAYLOR T. A graphbased networkvulnerability analysis system [J]. Sandia National Laboratories Albuquerque New, 1970: 973010.
[5] YAMANE S, NAKAMURA K. Modelchecking method based on binary decision diagram for realtime systems [J]. Technical Report of Ieice, 1997, 96: 18.
[6] OROJLOO H, AZGOMI M A. A method for modeling and evaluation of the security of cyberphysical systems [C]∥ 11th International ISC Conference on Information Security and Cryptology. Tehran: IEEE, 2014: 131-136.
[7] BINDA L, MOLINA C. Building materials durability: semimarkov approach [J]. Journal of Materials in Civil Engineering, 2014, 2(4):223-239.
[8] RASS S, SCHARTNER P. A unified framework for the analysis of availability, reliability and security, with applications to quantum networks [J]. IEEE Transactions on Systems Man and Cybernetics Part C Applications and Reviews, 2011, 41(1):107-119.
[9] ASHOK A, HAHN A, GOVINDARARASU M. Cyberphysical security of widearea monitoring, protection and control in a smart grid environment [J]. Journal of Advanced Research, 2014, 5(4):481-489.
[10] KEARNS M, LITTMAN M L, SINGH S. Graphical mjodels for game theory [J]. Uai, 2013: 253-260.
[11] YU JX, MAO A J, GUO Z Z. Vulnerability assessment of cyber security in power industry [C]∥ IEEE PES Power Systems Conference and Exposition. Piscataway: IEEE, 2006: 2200-2205.
[12] PIGGIN R S H. Development of industrial cyber security standards: IEC 62443 for SCADA and Industrial Control System security [C]∥ Conference on Control and Automation: Uniting Problems and Solutions. Birmingham: IET, 2013: 16.
[13] YOUNES M, KHERFANE R L. A new hybrid method for mulitiobjective economic power/emission dispatch in wind energy baased power system \[J\]. International Journal of System Assurance Engineering and Managament. 2014,5(4): 577-590.
[14] HUANG X, ZHANG T, MA Y, et al. Reinforced protection design forr replay attack of intelligent substation GOOSE/SMV Based on IEC62351 [C]∥ International Conference on Chemical, Material and Food Engineering. Kunming: Atlantis Press, 2015: 49-55.
[15] KHALILI A, SAMI A, AZIMI M, et al. Employing secure coding practices into industrial applications: a case study [J]. Empirical Software Engineering, 2016,21(1):1-13.
[16] HOLME P. Epidemiologically optimal static networks from temporal network data [J]. Plos Computational Biology, 2013, 9(7):3529-3546.
[17] DORON K W, BASSETT D S, GAZZANIGA M S. Dynamic network structure of interhemispheric coordination [J]. Proceedings of the National Academy of Sciences, 2012, 109(46): 18661-18668.
[18] PERELMAN L, AMIN S. A network interdiction model for analyzing the vulnerability of water distribution systems [C]∥ Proceedings of the 3rd international conference on High confidence networked systems. Berlin: ACM, 2014: 135-144.
[19] LATORA V, MARCHIORI M. Efficient behavior of smallworld networks [J]. Physical review letters, 2001, 87(19): 198701.
[20] BLANCKAERT K, VRIEND H J. Nonlinear modeling of mean flow redistribution in curved open channels [J]. Water Resources Research, 2003, 39(12):21-26.
[21] RICHARD L, MARIA P, RICHARD S. Identifying critical infrastructure: the median and covering facility interdiction problems [J]. Annals of the Association of American Geographers, 2004, 94(3):491-502.
[22] NAGURNEY A, QIANG Q. A network efficiency measure with application to critical infrastructure networks [J]. Journal of Global Optimization, 2008, 40(13):261-275.
[23] JIA L, THOMAS R J, TONG L. Malicious data attack on realtime electricity market [C]∥ 2011 IEEE International Conference on Acoustics, Speech and Signal Processing. Prague: IEEE, 2011: 5952-5955.
[24] MA C Y T, YAU D K Y, LOU X, et al. Markov game analysis for attackdefense of power networks under possible misinformation [J]. IEEE Transactions on Power Systems, 2013,28(2): 1676-1686.
[25] LIU Y, SHAO C H, YAN C Z, et al. Dynamic game theory with incomplete information in opinion dynamic [J]. Journal of Convergence Information Technology, 2012, 7(1):297-306.
[26] 徐漪楠, 朱荣旭. 从上海电力网络试论大城市供电网络的若干基本原则[J]. 华东电力, 1981, 12: 002.
XU Yinan, ZHU Rongxu. Some basic principles of power network based on Shanghai power network [J]. East China Power, 1981, 12: 002. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|