[1] Yaacoub J P A, Salman O, Noura H N, et al. Cyber-physical systems security:limitations, issues and future trends[J]. Microprocessors and Microsystems, 2020, 77:103201. [2] Pliatsios D, Sarigiannidis P, Lagkas T, et al. A survey on SCADA systems:secure proto cols, incidents, threats and tactics[J]. IEEE Communications Surveys & Tutorials, 2020, 22(3):1942-1976. [3] Alladi T, Chamola V, Parizi R M, et al. Blockchain applications for industry 4.0 and industrial IoT:a review[J]. IEEE Access, 2019, 7:176935-176951. [4] Asghar M R, Hu Q, Zeadally S. Cybersecurity in industrial control systems:issues, tech nologies, and challenges[J]. Computer Networks, 2019, 165:106946. [5] Kim S, Heo G, Zio E, et al. Cyber attack taxonomy for digital environment in nuclear power plants[J]. Nuclear Engineering and Technology, 2020, 52(5):995-1001. [6] Upadhyay D, Sampalli S. SCADA (supervisory control and data acquisition) systems:vulner ability assessment and security recommendations[J]. Computers & Security, 2020, 89:101666. [7] 赖英旭, 刘增辉, 蔡晓田, 等. 工业控制系统入侵检测研究综述[J]. 通信学报, 2017, 38(2):143-156. Lai Y X, Liu Z H, Cai X T, et al. Research on intrusion detection of industrial control system[J]. Journal on Communications, 2017, 38(2):143-156. (in Chinese) [8] Nourian A, Madnick S. A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 15(1):2-13. [9] Liang G, Weller S R, Zhao J, et al. The 2015 Ukraine blackout:implications for false data injection attacks[J]. IEEE Transactions on Power Systems, 2016, 32(4):3317-3318. [10] Akbanov M, Vassilakis V G, Logothetis M D. Ransomware detection and mitigation using software-defined networking:the case of WannaCry[J]. Computers & Electrical Engineering, 2019, 76:111-121. [11] 高岭, 王帆, 高妮, 等. 基于改进蚁群算法的防护策略选择模型[J]. 计算机工程与应用, 2019, 55(7):105-112. Gao L, Wang F, Gao N, et al. Security hardening measures selection model based on improved ant colony optimization[J]. Computer Engineering and Applications, 2019, 55(7):105-112. (in Chinese) [12] Cao C, Yuan L P, Singhal A, et al. Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs[C]//IFIP Annual Conference on Data and Applications Security and Privacy. Springer, Cham, 2018:330-348. [13] Sun Y, Wu T Y, Liu X, et al. Multilayered impact evaluation model for attacking missions[J]. IEEE Systems Journal, 2014, 10(4):1304-1315. [14] Mukherjee P, Mazumdar C. "Security Concern" as a metric for enterprise business processes[J]. IEEE Systems Journal, 2019, 13(4):4015-4026. [15] Sun X, Singhal A, Liu P. Who touched my mission:towards probabilistic mission impact assessment[C]//Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015:21-26. [16] Sun X, Singhal A, Liu P. Towards actionable mission impact assessment in the context of cloud computing[C]//IFIP Annual Conference on Data and Applications Security and Privacy. Springer, Cham, 2017:259-274. [17] Stergiopoulos G, Dedousis P, Gritzalis D. Automatic network restruck-turing and risk mitigation through business process asset dependency analysis[J]. Computers & Security, 2020, 96:101869. [18] Hassanzadeh A, Burkett R. SAMIIT:spiral attack model in IIoT mapping security alerts to attack life cycle phases[C]//5th International Symposium for ICS & SCADA Cyber Security Research, 2018:11-20. [19] Cheminod M, Durante L, Seno L, et al. Detection of attacks based on known vulnerabilities in industrial networked systems[J]. Journal of Information Security and Applications, 2017, 34:153-165. |