[1]LIU Jinwei,CAO Xiedong,XU Shiyi,et al.Research on information security evaluation of oil and gas SCADA system in cloud model[J].CAAI Transactions on Intelligent Systems,2018,13(2):296-302.[doi:10.11992/tis.201609001]
Copy

Research on information security evaluation of oil and gas SCADA system in cloud model

References:
[1] 饶志宏, 兰昆, 蒲石. 工业SCADA系统信息安全技术[M]. 北京: 国防工业出版社, 2014: 83-120.
RAO Zhihong, LAN Kun, PU Shi. Information security technologies on industrial SCADA systems[M]. Beijing: National Defense Industry Press, 2014: 83-120.
[2] 陈冬青, 彭勇, 谢丰. 我国工业控制系统信息安全现状及风险[J]. 中国信息安全, 2012(10): 64-70.
CHEN Dongqing, PENG Yong, XIE Feng. Information security status and risk of China’s industrial control system[J]. China information security, 2012(10): 64-70.
[3] 杜湘瑜, 尹全军, 黄柯棣, 等. 基于云模型的定性定量转换方法及其应用[J]. 系统工程与电子技术, 2008, 30(4): 772-776.
DU Xiangyu, YIN Quanjun, HUANG Kedi, et al. Transformation between qualitative variables and quantity based on cloud models and its application[J]. Systems engineering and electronics, 2008, 30(4): 772-776.
[4] COOK F S. Secure access point for scada devices[P]. US: 8176532, 2012-05-08.
[5] KNAPP E D. 工业网络安全[M]. 北京: 国防工业出版社, 2014: 12-145.
KNAPP E D. Industrial network security[M]. Beijing: National Defense Industry Press, 2014: 12-145.
[6] IEC. IEC 62443-1-1, Security for industrial automation and control systems. Part 1-1 terminology, concepts, and models[S]. IEC, 2013.
[7] 李静. 基于蜜罐日志分析的主动防御研究和实现[D]. 上海: 上海交通大学, 2009.
LI Jing. The research and implementation of initiative defense based on analysis honeypot logs[D]. Shanghai: Shanghai Jiao Tong University, 2009.
[8] 刘增良, 刘有才. 因素神经网络理论及其应用[M]. 贵阳: 贵州科技出版社, 1994.
Liu Zengliang, LIU Youcai. Factor neural networks and its application[M]. Guiyang: Guizhou Science and Technology Press, 1994.
[9] 刘增良, 刘有才. 因素神经网络理论及实现策略研究[M]. 北京: 北京师范大学出版社, 1992.
LIU Zengliang, LIU Youcai. Research on the theory of factor neural nerwork and its realization[M]. Beijing: Research on the throry of factor neural network and its realization, 1992.
[10] 杨朝晖, 李德毅. 二维云模型及其在预测中的应用[J]. 计算机学报, 1998, 21(11): 961-969.
YANG Zhaohui, LI Deyi. Planar model and its application in prediction[J]. Chinese journal of computers, 1998, 21(11): 961-969.
[11] 李静. 基于云模型的C2C卖家信任评价方法研究[D]. 天津: 南开大学, 2009.
LI Jing. Study on the evaluation method of C2C sellers trust based on cloud model[D]. Tianjin: Nankai University, 2009.
[12] 王国胤, 李德毅. 云模型与粒计算[M]. 北京: 科学出版社, 2012: 3-90.
WANG Guoyin, LI Deyi. Cloud model and granular computing [M]. Beijing: Science Press, 2012: 3-90.
[13] 温景容, 武穆清, 宿景芳. 信息物理融合系统[J]. 自动化学报, 2012, 38(4): 507-517.
WEN Jingrong, WU Muqing, SU Jingfang. Cyber-physical system[J]. Acta automatica sinica, 2012, 38(4): 507-517.
[14] FOVINO I N, MASERA M, GUIDI L, et al. An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants[C]//Proceedings of the 3rd Conference on Human System Interactions. Rzeszow, Poland, 2010: 679-686.
[15] 曹谢东. 模糊信息处理及应用[M]. 北京: 科学出社, 2003: 103-104.
CAO Xiedong. Fuzzy information processing and application[M]. Beijing: Science Press, 2003: 103-104.
Similar References:

Memo

-

Last Update: 1900-01-01

Copyright © CAAI Transactions on Intelligent Systems