[1] ENISA. Protecting industrial control systems. recommendations for Europe and member states[EB/OL].[2017-10-16]. https://www.enisa.europa.eu/publications/protecting-industrial-control-systems.-recommendations-for-europe-and-member-states. [2] 陶耀东,李宁,曾广圣.工业控制系统安全综述[J].计算机工程与应用,2016,52(13):8-18.(TAO Y D, LI N, ZENG G S. Review of industrial control systems security[J]. Computer Engineering and Applications, 2016, 52(13):8-18.) [3] FALLIERE N, MURCHU L O, CHIEN E. W32.Stuxnet Dossier[EB/OL].[2017-10-16]. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf. [4] MOHURLE S, PATIL M. A brief study of WannaCry threat:ransomware attack 2017[J]. International Journal of Advanced Research in Computer Science, 2017, 8(5):1938-1940. [5] BURGESS M. Could hackers really take over a hotel? WIRED explains[EB/OL].[2017-10-16]. http://www.wired.co.uk/article/austria-hotel-ransomware-true-doors-lock-hackers. [6] FORMBY D, DURBHA S, BEYAH R. Out of control:ransomware for industrial control systems[EB/OL].[2017-10-16]. http://www.cap.gatech.edu/plcransomware.pdf. [7] SPENNEBERG R, BRVGGEMANN M, SCHWARTKE H. PLC-blaster:a worm living solely in the PLC[EB/OL].[2017-10-16]. https://www.blackhat.com/docs/asia-16/materials/asia-16-Spenneberg-PLC-Blaster-A-Worm-Living-Solely-In-The-PLC-wp.pdf. [8] KLICK J, LAU S, MARZIN D, et al. Internet-facing PLCs - a new back orifice[EB/OL].[2017-10-16]. http://www.inf.fu-berlin.de/inst/ag-si/pub/us-15-Klick-Internet-Facing-PLCs-A-New-Back-Orifice-paper.pdf. [9] KASPIN D. The lion at the waterhole:the secrets of life and death in Chewa rites de passage[M]//Those Who Play With Fire:Gender, Fertility and Transformation in East and Southern Africa. London:Athlone Press, 1999:83-99. [10] XIAO C. Novel malware xcodeghost modifies xcode, infects apple ios apps and hits app store[EB/OL].[2017-10-16]. https://researchcenter.paloaltonetworks.com/2015/09/novel-malware-xcodeghost-modifies-xcode-infects-apple-ios-apps-and-hits-app-store/. [11] TISCHER M, DURUMERIC Z, et al. Users really do plug in USB drives they find[C]//Proceedings of the 2016 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2016:306-319. [12] HUNT R. Internet/Intranet firewall security - policy, architecture and transaction services[J]. Computer Communications, 1998, 21(13):1107-1123. [13] CHESWICK W R, BELLOVIN S M, RUBIN A D. Firewalls and Internet Security:Repelling the Wily Hacker[M]. 2nd Edition. Boston, MA:Addison-Wesley Longman Publishing Company, 2003:24-34. [14] TARI Z, CHAN S W. A role-based access control for intranet security[J]. IEEE Internet Computing, 1997, 1(5):24-34. [15] 春增军,邹来龙.发电企业集团办公网与互联网隔离策略分析与方案研究[J].电子技术应用,2010(1):144-147.(CHUN Z J, ZHOU L L. The policy analysis and project study to electricity enterprise group's Intranet and Internet network isolation[J]. Application of Electronic Technique, 2010(1):144-147.) [16] WILLIAMS T J. The purdue enterprise reference architecture[J]. Computers in Industry, 1994, 24(2/3):141-158. [17] 尚文利,安攀峰,万明,等.工业控制系统入侵检测技术的研究及发展综述[J].计算机应用研究,2017,34(2):328-333,342.(SHANG W L, AN P F, WAN M, et al. Research and development overview of intrusion detection technology in industrial control system[J]. Application Research for Computers, 2017, 34(2):328-333, 342.) [18] 彭勇,向憧,张淼,等.工业控制系统场景指纹及异常检测[J].清华大学学报(自然科学版),2016,56(1):14-21.(PENG Y, XIANG T, ZHANG M, et al. Scenario fingerprint of an industrial control system and abnormally detection[J]. Journal of Tsinghua University (Science and Technology), 2016, 56(1):14-21.) |