Modeling security in cyber–physical systems
Tài liệu tham khảo
Alur, 1993, Hybrid automata, 209
Alur, 1994, A theory of timed automata, Theoretical Computer Science, 126, 183, 10.1016/0304-3975(94)90010-8
Babaoglu, 1987, On the reliability of consensus-based fault-tolerant distributed computing systems, ACM Transactions on Computer Systems, 5, 394, 10.1145/29868.31332
Bengtsson, 2003, Timed automata, 87
Blanke, 2006
M. Burmester, Y. Desmedt, T. Itoh, K. Sakurai, H. Shizuya, M. Yung, A progress report on subliminal-free channels, in: Proceedings of the First International Workshop on Information Hiding, 1996, pp. 157–168.
Burmester, 2009, Universally composable RFID identification and authentication protocols, ACM Transactions on Information and System Security, 12, 1, 10.1145/1513601.1513603
Butts, 2010, Modeling control system failures and attacks—The Waterloo campaign to oil pipelines, 43
A. Cardenas, S. Amin, Z. Lin, Y. Huang, C. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection and response, in: Proceedings of the Sixth ACM Symposium on Information, Computer and Communications Security, 2011, pp. 355–366.
Cardenas, 2009, Rethinking security properties, threat models and the design space in sensor networks, Ad Hoc Networks, 7, 1434, 10.1016/j.adhoc.2009.04.012
Chow, 2009, Where East meets West, Washington Quarterly (Center for Strategic and International Studies), 32, 77, 10.1080/01636600802552247
Department of Homeland Security and Centre for the Protection of the National Infrastructure, Cyber Security Assessments of Industrial Control Systems, Washington, DC 〈www.us-cert.gov/control_systems/pdf/Cyber_Security_Assessments_of_Industrial_Control_Systems.pdf〉, 2010.
J. Eisenhauer, P. Donnelly, M. Ellis, M. O'Brien, Roadmap to Secure Control Systems in the Energy Sector, Energetics, Columbia, MD, 2006.
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, N. Mead, Survivable Network Systems: An Emerging Discipline, Technical Report CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, 1997.
N. Falliere, L. Murchu, E. Chien, W32. Stuxnet Dossier, Symantec, Mountain View, California, 2011.
Hamlen, 2006, Computability classes for enforcement mechanisms, ACM Transactions on Programming Languages and Systems, 28, 175, 10.1145/1111596.1111601
R. Kisner, W. Manges, T. Mcintyre, J. Nutaro, J. Munro, P. Ewing, M. Howlader, P. Kuruganti, M. Olama, Cybersecurity Through Real-Time Distributed Control Systems, Technical Report ORNL/TM-2010/30, Oak Ridge National Laboratory, Oak Ridge, TN, 2010.
Koza, 1992
Lamport, 1997, Proving the correctness of multiprocess programs, IEEE Transactions on Software Engineering, 3, 125, 10.1109/TSE.1977.229904
Lamport, 1998, Proving possibility properties, Theoretical Computer Science, 206, 341, 10.1016/S0304-3975(98)00129-7
N. Lynch, R. Segala, F. Vaandrager and H. Weinberg, Hybrid I/O automata, in: Proceedings of the DIMACS Workshop on Verification and Control of Hybrid Systems, 1995, pp. 496–510.
Mangard, 2007
B. McMillin, Personal communication, 2012.
I. Roychoudhury, M. Daigle, P. Mosterman, G. Biswas, X. Koutsoukos, A method for the efficient simulation of hybrid bond graphs, in: Proceedings of the International Conference on Bond Graph Modeling, 2007, pp. 177–184.
Schneier, 1999, Attack trees, Dr. Dobb's Journal, 24, 21
Seo, 2003, Toward an automated design method for multi-domain dynamic systems using bond graph and genetic programming, Mechatronics, 13, 851, 10.1016/S0957-4158(03)00006-0
G. Simmons, Personal communication, 1993.
Slay, 2007, Lessons learned from the Maroochy water breach, 73
Ten, 2008, Vulnerability assessment of cybersecurity for SCADA systems, IEEE Transactions on Power Systems, 23, 1836, 10.1109/TPWRS.2008.2002298
