[1] LEE E. Cyber physical systems: design challenges [C]// ISORC 2008: Proceedings of the 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing. Piscataway, NJ: IEEE, 2008: 363-369. [2] LANGNER R. STUXNET: dissecting a cyberwarfare weapon [J]. IEEE security & privacy, 2011, 9(3): 49-51. [3] BYES E J, FRANZ M, MILLER D. The use of attack trees in assessing vulnerabilities in SCADA systems [C]// IISW'04: Proceedings of the 2014 IEEE Conference on International Infrastructure Survivability Workshop. Piscataway, NJ: IEEE, 2014: 210-217. [4] TEN C W, LIU CHENCHING, GOVINDARASU M, Vulnerability assessment of cybersecurity for SCADA systems using attack trees [C]// Proceedings of the 2007 IEEE Conference on Power Engineering Society General Meeting. Piscataway, NJ: IEEE, 2007: 165-170. [5] PARK G Y, LEE C K, CHOI J G, et al. Cyber security analysis by attack trees for a reactor protection system [C]// Proceedings of the 2008 Korean Nuclear Society Fall Meeting. Pyeong Chang, Koera: Korean Nuclear Society, 2008: 13-18. [6] XIE F, LU T, GUO X, et al. Security analysis on cyber-physical system using attack tree [C]// Proceedings of the 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway, NJ: IEEE, 2013: 429-432. [7] PATEL S C, GRANHAM J H, RALSTON P A S. Quantitatively assessing the vulnerability of critical information systems: a new method for evaluating security enhancements [J]. International journal of information management, 2008, 28(6): 483-491. [8] HAWRYLAK P J, HARTNEY C, PAPA M, et al. Using hybrid attack graphs to model and analyze attacks against the critical information infrastructure [J]. Critical information infrastructure protection and resilience in the ICT sector, 2013, 11(3): 173-179. [9] 徐昕,虞慧群,黄骏虎.基于Petri网的CPS系统安全量化分析模型[J].计算机工程与应用,2014,50(3):82-88(XU X,YU H Q, HUANG J H. Petri net based security quantitative analysis model for cyber-physical system [J]. Computer engineering and applications, 2014, 50(3): 82-88.) [10] CHEN T M, SANCHEZ-AARNOUTSE J C, BUFORD J. Petri net modeling of cyber-physical attacks on smart grid [J]. IEEE transactions on smart grid, 2011, 2(4): 741-749. [11] FUNG C C, ROUMANI M A, WONG K P. A proposed study on economic impacts due to cyber attacks in smart grid: a risk based assessment [C]// Proceedings of the 2013 IEEE Power and Energy Society General Meeting. Piscataway, NJ: IEEE, 2013: 1-5. [12] HABASH R W Y, GROZA V, BURR K. Risk management framework for the power grid cyber-physical security [J]. British journal of applied science & technology, 2013, 3(4): 1070-1085. [13] HOUMB S H, FRANQUEIRA V N L, ENGUM E A. Quantifying security risk level from CVSS estimates of frequency and impact [J]. Journal of systems and software, 2010, 83(9): 1622-1634. [14] FREI S, MAY M, FIEDLER U, et al. Large-scale vulnerability analysis [C]// Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense. New York: ACM, 2006: 131-138. |