[1] 秦国英. 城市轨道交通列控系统信息安全入侵检测方法研究[D].北京:北京交通大学,2019. QIN Guoying. Cyber security intrusion detection methods of urban rail transit control system[D].Beijing: Beijing Jiaotong University, 2019. [2] KIM S, WON Y, PARK I H, et al. Cyber-physical vulnerability analysis of communication-based train control[J]. IEEE Internet of Things Journal, 2019, 6(4): 6 353-6 362. [3] REKIK M, GRANSART C, BERBINEAU M. Cyber-physical security risk assessment for train control and monitoring systems[C]. 2018 IEEE Conference on Communications and Network Security (CNS). IEEE, 2018: 1-9. [4] 张维,步兵,王洪伟.基于KF的列控系统数据篡改攻击检测方法[J].中国安全科学学报,2019,29(增1):32-37. ZHANG Wei, BU Bing, WANG Hongwei. An intrusion detection method of date tampering attack in train control system based on KF[J]. China Safety Science Journal, 2019,29(S1):32-37. [5] 董慧宇,唐涛,王洪伟.基于二维结构熵的CBTC系统信息安全风险评估方法[J].自动化学报,2019,45(1):153-162. DONG Huiyu, TANG Tao, WANG Hongwei. A 2D structure entropy-based approach to security assessment of communication-based train control system[J]. Acat Automatica Sinica,2019,45(1):153-162. [6] WANG Lijian, WANG Bin, PENG Yongjun. Research the information security risk assessment technique based on Bayesian network[C]. 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). IEEE, 2010, 3: V3-600-V3-604. [7] MURATA T. Petri nets: properties, analysis and applications[J]. Proceedings of the IEEE, 1989, 77(4): 541-580. [8] KAMIL M Z, TALEB-BERROUANE M, KHAN F, et al. Dynamic domino effect risk assessment using petri-nets[J]. Process Safety and Environmental Protection, 2019, 124: 308-316. [9] 余敬芝,燕飞,牛儒.基于Petri网的形式化安全分析方法[J].中国安全科学学报,2019,29(增2):138-143. YU Jingzhi, YAN Fei, NIU Ru. Formal safety analysis method based on Petri net [J]. China Safety Science Journal, 2019,29(S2):138-143. [10] SCHNEIER B. Attack trees modeling security threats[J]. Dr. Dobb′s Journal, 1999, 24(12): 21-29. [11] 熊文泽,靳江红,唐军梅.SCADA系统信息安全定量风险评估方法[J].中国安全科学学报,2019,29(8):157-163. XIONG Wenze, JIN Jianghong, TANG Junmei. Quantitative risk assessment method for information security of SCADA systems [J]. China Safety Science Journal, 2019,29(8):157-163. [12] 陈荣武,诸昌钤,刘莉.CBTC系统列车追踪间隔计算及优化[J].西南交通大学学报,2011,46(4):579-585. CHEN Rongwu, ZHU Changqian, LIU Li. Calculation and optimization of train headway in CBTC system[J]. Journal of Southwest Jiaotong University,2011,46(4):579-585. [13] BOCCALETTI S, LATORA V, MORENO Y, et al. Complex networks: Structure and dynamics[J]. Physics Reports, 2006, 424(4/5): 175-308. [14] 黄慧萍,肖世德,孟祥印.基于攻击树的工业控制系统信息安全风险评估[J].计算机应用研究,2015,32(10):3022-3025. HUANG Huiping, XIAO Shide, MENG Xiangyin.Attack tree-based method for assessing cyber security risk of industrial control system[J]. Application Research of Computes,2015,32(10):3022-3025. |