Systematization and security assessment of cyber-physical systems
Tóm tắt
Từ khóa
Tài liệu tham khảo
NSF Workshop on Cyber-Physical Systems, Austin, TX, 2006, pp. 6–17.
Schneider, F.B., Enforceable security policies, ACM Trans. Inf. Syst. Secur., 2000, vol. 3, no. 1, pp. 30–50. doi 10.1145/353323.353382
Mulligan, D.K. and Schneider, F.B., Doctrine for cybersecurity, Daedalus, 2011, vol. 140, no. 4, pp. 70–92.
Ashibani, Y. and Mahmoud, Q.H., Cyber physical systems security: Analysis, challenges and solutions, Comput. Secur., 2017, vol. 68, pp. 81–97.
GOST (State Standard) R ISO/MEK 17799-2005: Information Technology: Practical Rules for Information Security Management.
GOST (State Standard) R ISO/MEK 27032-2012: Information Technology. Security Techniques. Guidelines for Cybersecurity.
Dukhvalov, A., IIoT–Industrial Internet of Threats?, IoT Summit, St. Petersburg, 2016. http://unicongress.ru/wp-content/uploads/iot16/s2-5.pdf.
Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627–633.
Zegzhda, P.D., Zegzhda, D.P., Pechenkin, A.I., and Poltavtseva, M.A., Modeling information systems for solving the problem of security management, Probl. Inf. Bezop., Komp’yut. Sist., 2016, no. 3, pp. 7–16.
Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673–681.
Zegzhda, D.P. and Stepanova, T.V., Applying large-scale adaptive graphs to modeling internet of things security, Proceedings of the 7th International Conference on Security of Information and Networks, SIN 2014, 2014, pp. 479–482.
Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813–819.
Gaaze-Rapoport, M.G. and Pospelov, D.A., Ot ameby do robota–modeli povedeniya (From Amoeba to Robot: Models of Behavior), Moscow: Nauka, 1987.