[1] |
贾晓哲.城市轨道交通ATC系统信息安全建设方案[J].都市快轨交通,2017,30(1):26-28.JIA Xiaozhe. Information security of automatic train control system for urban rail transit[J].Urban Rapid Rail Transit, 2017, 30(1):26-28.
|
[2] |
KIM Yongho, PARK Wonhyung. A study on cyber threat prediction based on intrusion detection event for APT attack detection[J]. Multimedia Tools and Applications, 2014, 71(2):685-698.
|
[3] |
包正堂. 列控系统信息安全风险主动防御研究[D]. 北京:北京交通大学,2017.BAO Zhengtang. Research on active defense of information security risk in train control system[D]. Beijing:Beijing Jiaotong University, 2017.
|
[4] |
杨德全,刘卫民,俞宙.基于蜜罐的主动防御应用研究[J].网络与信息安全学报,2018,4(1):57-62,78.YANG Dequan, LIU Weimin, YU Zhou. Research on active defense application based on honeypot[J]. Chinese Journal of Network and Information Security,2018,4(1):57-62,78.
|
[5] |
秦玉杰.一种基于分布式蜜罐技术的勒索蠕虫病毒监测方法[J].信息技术与网络安全,2018,37(9):45-48.QIN Yujie. Ransom worm virus monitoring method based on distributed honeypot technology[J]. Information Technology and Network Security, 2018, 37(9):49-52.
|
[6] |
LIU Yu, CRISTINA C, HONG Man. A Bayesian game approach for intrusion detection in wireless ad hoc networks[C]. Proceeding from the Workshop on Game Theory for Communications & Networks, 2006: 1 190 195-1 190 198.
|
[7] |
OROJLOO H, AZGOMI M A. A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems[J]. Journal of Network and Systems Management, 2018, 26(4):929-965.
|
[8] |
ZHU Quanyan, STEFAN R. On multi-phase and multi-stage game-theoretic modeling of advanced persistent threats[J]. IEEE Access, 2018, 6:13 958-13 971.
|
[9] |
郜春海. 基于通信的轨道交通列车运行控制系统[J]. 现代城市轨道交通, 2007, 4(2):7-10,74.GAO Chunhai. The communication-based train control system[J]. Modern Urban Transit, 2007, 4(2):7-10,74.
|
[10] |
陈永刚, 罗雅允, 贺欢欢. 基于WLAN的CBTC系统中安全通信协议设计与验证[J]. 兰州交通大学学报, 2015, 34(4):6-12.CHEN Yonggang, LUO Yayun, HE Huanhuan. Design and verification of security communication protocol in CBTC system based on WLAN[J]. Journal of Lanzhou Jiaotong University, 2015, 34(4):6-12.
|
[11] |
张本宏,陆阳, 韩江洪,等. “二乘二取二”冗余系统的可靠性和安全性分析[J]. 系统仿真学报, 2009, 21(1):256-261.ZHANG Benhong, LU Yang, HAN Jianghong, et al. Reliability and security analysis of double 2-vote-2 redundancy system[J]. Journal of System Simulation, 2009, 21(1):256-261.
|
[12] |
孙志浩. CBTC系统安全通信协议的研究[D]. 成都:西南交通大学, 2014.SUN Zhihao. The research of safety-critical communication protocol in CBTC system[D]. Chengdu: Southwest Jiaotong University, 2014.
|