|
[1]
|
Chen, J., Wu, J., Liang, H., et al. (2020) Collaborative Trust Blockchain Based Unbiased Control Transfer Mechanism for Industrial Automation. IEEE Transactions on Industry Applications, 56, 4478-4488. [Google Scholar] [CrossRef]
|
|
[2]
|
Humayed, A., Lin, J., Li, F., et al. (2017) Cyber-Physical Systems Security—A Survey. IEEE Internet of Things Journal, 4, 1802-1831. [Google Scholar] [CrossRef]
|
|
[3]
|
Desouza, K.C., Ahmad, A., Naseer, H., et al. (2020) Weaponiz-ing Information Systems for Political Disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT). Com-puters & Security, 88, Article ID: 101606. [Google Scholar] [CrossRef]
|
|
[4]
|
刘芳. 信息系统安全评估理论及其关键技术研究[D]: [博士学位论文]. 长沙: 国防科学技术大学, 2005.
|
|
[5]
|
刘道远, 孙科达, 周君良, 等. 模糊综合评判法在电力企业网络信息安全评估中的应用[J]. 电信科学, 2020, 36(3): 38-45.
|
|
[6]
|
黄家辉, 冯冬芹, 王虹鉴. 基于攻击图的工控系统脆弱性量化方法[J]. 自动化学报, 2016, 42(5): 155-161.
|
|
[7]
|
Buldas, A., Gadyatskaya, O., Lenin, A., et al. (2020) Attribute Evaluation on Attack Trees with Incomplete Information. Computers & Security, 88, Article ID: 101630. [Google Scholar] [CrossRef]
|
|
[8]
|
Lee, J., Moon, D., Kim, I., et al. (2019) A Semantic Approach to Improving Machine Readability of a Large-Scale Attack Graph. Journal of Supercomputing, 75, 3028-3045. [Google Scholar] [CrossRef]
|
|
[9]
|
Islam, S.A. (2020) A Graph-Based Approach towards Hardware Trojan Vulnerability Analysis. Electronics Letters, 56, 868-871. [Google Scholar] [CrossRef]
|
|
[10]
|
杨英杰, 冷强, 潘瑞萱, 等. 基于属性攻击图的动态威胁跟踪与量化分析技术研究[J]. 电子与信息学报, 2019, 41(9): 2172-2179.
|
|
[11]
|
Lu, C., Feng, J., Chen, Y., et al. (2020) Tensor Robust Principal Component Analysis with a New Tensor Nuclear Norm. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42, 925-938. [Google Scholar] [CrossRef]
|
|
[12]
|
Wen, C., Huang, X. and Shen, C. (2020) Multiple-Pass En-hanced Raman Spectroscopy for Fast Industrial Trace Gas Detection and Process Control. Journal of Raman Spectros-copy, 51, 781-787. [Google Scholar] [CrossRef]
|
|
[13]
|
杨英杰, 冷强, 常德显, 等. 基于属性攻击图的网络动态威胁分析技术研究[J]. 电子与信息学报, 2019, 41(8): 1838-1846.
|
|
[14]
|
Cao, J., et al. (2021) Hy-brid-Triggered-Based Security Controller Design for Networked Control System under Multiple Cyber Attacks. Infor-mation Sciences, 548, 69-84. [Google Scholar] [CrossRef]
|
|
[15]
|
Sheikhpour, S., Mahani, A. and Bagheri, N. (2019) Practical Fault Resilient Hardware Implementations of Advanced Encryption Standard. IET Circuits, Devices & Systems, 13, 596-606. [Google Scholar] [CrossRef]
|
|
[16]
|
He, D., Liu, X., Zheng, J., et al. (2020) A Lightweight and Intelligent Intrusion Detection System for Integrated Electronic Systems. IEEE Net-work.
|
|
[17]
|
Yu, B., Cai, Y. and Wu, D. (2020) Joint Access Control and Resource Allocation for Short-Packet-Based mMTC in Status Update Systems. IEEE Journal on Selected Areas in Communications. [Google Scholar] [CrossRef]
|
|
[18]
|
Figueroa-Lorenzo, S., Añorga, J. and Arrizabalaga, S. (2020) A Survey of IIoT Protocols: A Measure of Vulnerability Risk Analysis Based on CVSS. ACM Computing Surveys, 53, 1-53. [Google Scholar] [CrossRef]
|
|
[19]
|
Mehlawat, M.K., Gupta, P. and Mahajan, D. (2020) A Multi-Period Multi-Objective Optimization Framework for Software Enhancement and Component Evaluation, Selection and Integra-tion. Information Sciences, 523, 91-110. [Google Scholar] [CrossRef]
|
|
[20]
|
Ikram, M., Sroufe, R., Rehman, E., et al. (2020) Do Quality, Envi-ronmental, and Social (QES) Certifications Improve International Trade? A Comparative Grey Relation Analysis of De-veloping vs. Developed Countries. Physica A: Statistical Mechanics and Its Applications, 545, Article ID: 123486. [Google Scholar] [CrossRef]
|
|
[21]
|
Gui, C.-Y., Zheng, L. and He, B.S. (2019) A Survey on Graph Processing Accelerators: Challenges and Opportunities. Journal of Computer Science and Technology, 34, 339-371. [Google Scholar] [CrossRef]
|
|
[22]
|
Reynoso-Meza, G., et al. (2016) Preference Driven Mul-ti-Objective Optimization Design Procedure for Industrial Controller Tuning. Information Sciences: An International Journal, 339, 108-131. [Google Scholar] [CrossRef]
|