[1]刘劲威,曹谢东,徐诗艺,等.云模型油气SCADA系统信息安全评价研究[J].智能系统学报,2018,13(2):296-302.[doi:10.11992/tis.201609001]
 LIU Jinwei,CAO Xiedong,XU Shiyi,et al.Research on information security evaluation of oil and gas SCADA system in cloud model[J].CAAI Transactions on Intelligent Systems,2018,13(2):296-302.[doi:10.11992/tis.201609001]
点击复制

云模型油气SCADA系统信息安全评价研究

参考文献/References:
[1] 饶志宏, 兰昆, 蒲石. 工业SCADA系统信息安全技术[M]. 北京: 国防工业出版社, 2014: 83-120.
RAO Zhihong, LAN Kun, PU Shi. Information security technologies on industrial SCADA systems[M]. Beijing: National Defense Industry Press, 2014: 83-120.
[2] 陈冬青, 彭勇, 谢丰. 我国工业控制系统信息安全现状及风险[J]. 中国信息安全, 2012(10): 64-70.
CHEN Dongqing, PENG Yong, XIE Feng. Information security status and risk of China’s industrial control system[J]. China information security, 2012(10): 64-70.
[3] 杜湘瑜, 尹全军, 黄柯棣, 等. 基于云模型的定性定量转换方法及其应用[J]. 系统工程与电子技术, 2008, 30(4): 772-776.
DU Xiangyu, YIN Quanjun, HUANG Kedi, et al. Transformation between qualitative variables and quantity based on cloud models and its application[J]. Systems engineering and electronics, 2008, 30(4): 772-776.
[4] COOK F S. Secure access point for scada devices[P]. US: 8176532, 2012-05-08.
[5] KNAPP E D. 工业网络安全[M]. 北京: 国防工业出版社, 2014: 12-145.
KNAPP E D. Industrial network security[M]. Beijing: National Defense Industry Press, 2014: 12-145.
[6] IEC. IEC 62443-1-1, Security for industrial automation and control systems. Part 1-1 terminology, concepts, and models[S]. IEC, 2013.
[7] 李静. 基于蜜罐日志分析的主动防御研究和实现[D]. 上海: 上海交通大学, 2009.
LI Jing. The research and implementation of initiative defense based on analysis honeypot logs[D]. Shanghai: Shanghai Jiao Tong University, 2009.
[8] 刘增良, 刘有才. 因素神经网络理论及其应用[M]. 贵阳: 贵州科技出版社, 1994.
Liu Zengliang, LIU Youcai. Factor neural networks and its application[M]. Guiyang: Guizhou Science and Technology Press, 1994.
[9] 刘增良, 刘有才. 因素神经网络理论及实现策略研究[M]. 北京: 北京师范大学出版社, 1992.
LIU Zengliang, LIU Youcai. Research on the theory of factor neural nerwork and its realization[M]. Beijing: Research on the throry of factor neural network and its realization, 1992.
[10] 杨朝晖, 李德毅. 二维云模型及其在预测中的应用[J]. 计算机学报, 1998, 21(11): 961-969.
YANG Zhaohui, LI Deyi. Planar model and its application in prediction[J]. Chinese journal of computers, 1998, 21(11): 961-969.
[11] 李静. 基于云模型的C2C卖家信任评价方法研究[D]. 天津: 南开大学, 2009.
LI Jing. Study on the evaluation method of C2C sellers trust based on cloud model[D]. Tianjin: Nankai University, 2009.
[12] 王国胤, 李德毅. 云模型与粒计算[M]. 北京: 科学出版社, 2012: 3-90.
WANG Guoyin, LI Deyi. Cloud model and granular computing [M]. Beijing: Science Press, 2012: 3-90.
[13] 温景容, 武穆清, 宿景芳. 信息物理融合系统[J]. 自动化学报, 2012, 38(4): 507-517.
WEN Jingrong, WU Muqing, SU Jingfang. Cyber-physical system[J]. Acta automatica sinica, 2012, 38(4): 507-517.
[14] FOVINO I N, MASERA M, GUIDI L, et al. An experimental platform for assessing SCADA vulnerabilities and countermeasures in power plants[C]//Proceedings of the 3rd Conference on Human System Interactions. Rzeszow, Poland, 2010: 679-686.
[15] 曹谢东. 模糊信息处理及应用[M]. 北京: 科学出社, 2003: 103-104.
CAO Xiedong. Fuzzy information processing and application[M]. Beijing: Science Press, 2003: 103-104.
相似文献/References:
[1]冯 珊,郭四海,等.武器装备虚拟采办技术风险综合评估[J].智能系统学报,2008,3(5):384.
 FENG Shan,GUO Si-hai,ZHOU Kai-bo,et al.A comprehensive means for evaluating techn ical r isk in the simulation based acquisition model for weapon systems[J].CAAI Transactions on Intelligent Systems,2008,3():384.
[2]李??? 众,刘??? 艳.二维正态云模型的单规则推理映射[J].智能系统学报,2010,5(5):464.[doi:10.3969/j.issn.1673-4785.2010.05.015]
 LI Zhong,LIU Yan.Single rule reasoning mapping for the two dimensional normal cloud model[J].CAAI Transactions on Intelligent Systems,2010,5():464.[doi:10.3969/j.issn.1673-4785.2010.05.015]
[3]王辉,秦术,刘少英,等.曲线拟合的逆向云改进算法[J].智能系统学报,2014,9(5):590.[doi:10.3969/j.issn.1673-4785.201304078]
 WANG Hui,QIN Shu,LIU Shaoying,et al.An improved algorithm of backward cloud based on curve fitting[J].CAAI Transactions on Intelligent Systems,2014,9():590.[doi:10.3969/j.issn.1673-4785.201304078]
[4]苗夺谦,张清华,钱宇华,等.从人类智能到机器实现模型——粒计算理论与方法[J].智能系统学报,2016,11(6):743.[doi:10.11992/tis.201612014]
 MIAO Duoqian,ZHANG Qinghua,QIAN Yuhua,et al.From human intelligence to machine implementation model: theories and applications based on granular computing[J].CAAI Transactions on Intelligent Systems,2016,11():743.[doi:10.11992/tis.201612014]
[5]王洪利.一种参照模糊集的云模型集合论方法研究[J].智能系统学报,2020,15(3):507.[doi:10.11992/tis.201810030]
 WANG Hongli.A method of cloud model set theory referring to fuzzy sets[J].CAAI Transactions on Intelligent Systems,2020,15():507.[doi:10.11992/tis.201810030]
[6]杨力,秦红梅,苏华文.基于云模型和组合权重的SCADA系统安全风险评估研究[J].智能系统学报,2022,17(5):969.[doi:10.11992/tis.202107005]
 YANG Li,QIN Hongmei,SU Huawen.Research on security risk assessment of SCADA system based on the cloud model and combination weighting[J].CAAI Transactions on Intelligent Systems,2022,17():969.[doi:10.11992/tis.202107005]

备注/Memo

收稿日期:2016-09-30。
基金项目:国家自然科学基金项目(61175122);四川省苗子工程项目(2016027).
作者简介:刘劲威,男,1992年生,硕士研究生,主要研究方向为模式识别与智能控制;曹谢东,男,1954年生,教授,主持国家自然科学基金项目,承担国家863、国家重大科技攻关项目和省部级项目多项,获四川省科技进步二等奖1项、三等奖2项,专著三部,主要从事人工智能,工业控制信息系统安全、智能测控等方面的研究和应用工作;徐诗艺,女,1993年生,硕士研究生,主要研究方向为模式识别与智能系统,参加“第十二届华为杯电子设计大赛”并获得全国三等奖,发表学术论文1篇。
通讯作者:刘劲威.E-mail:411622401@qq.com.

更新日期/Last Update: 1900-01-01
Copyright © 《 智能系统学报》 编辑部
地址:(150001)黑龙江省哈尔滨市南岗区南通大街145-1号楼 电话:0451- 82534001、82518134 邮箱:tis@vip.sina.com