[1]Cheminod M, Durante L, Valenzano A. Review of security issues in industrial networks[J]. IEEE Trans on Industrial Informatics, 2013, 9(1): 277293[2]Zhao Lijie, Chai Tianyou, Yuan Decheng. Selective ensemble extreme learning machine modeling of effluent quality in wastewater treatment plants[J]. International Journal of Automation and Computing, 2012, 9(6): 627633[3]Zhao Meiyuan, Walker J, Wang C C. Challenges and opportunities for securing intelligent transportation system[J]. IEEE Journal on Emerging & Selected Topics in Circuits & Systems, 2013, 3(1): 96105[4]Hashimoto Y, Toyoshima T, Yogo S, et al. Safety securing approach against cyberattacks for process control system[J]. Computers & Chemical Engineering, 2013, 57(20): 181186[5]Wan Kaiyu, Alagar V. Contextaware security solutions for cyberphysical systems[J]. Mobile Networks and Applications, 2014, 19(2): 115[6]Derler P, Lee E A, Vincentelli A S. Modeling cyberphysical systems[J]. Proceedings of the IEEE, 2012, 100(1): 1328[7]李仁发, 谢勇, 李蕊, 等. 信息物理融合系统若干关键问题综述[J]. 计算机研究与发展, 2012, 49(6): 11491161[8]Cardenas A, Amin S, Sinopoli B, et al. Challenges for securing cyber physical systems[C] Proc of Workshop on Future Directions in CyberPhysical Systems Security. 2009 [20170125]. https:pdfs.semanticscholar.orgd51497e5827cc00d9d00c26e27a769d42284cfba.pdf[9]魏怀鉴, 鲍皖苏. 形式化方法和测试技术及其在安全中的应用[J]. 微计算机信息, 2006, 22(33): 5557[10]李力行, 金芝, 李戈. 基于时间自动机的物联网服务建模和验证[J]. 计算机学报, 2011, 34(8): 13651377[11]Huang Shuang, Zhou Chunjie, Yang Shuanghua, et al. Cyberphysical system security for networked industrial processes[J]. International Journal of Automation and Computing, 2015, 12(6): 567578[12]王婷, 陈铁明, 刘杨. 基于模拟关系的精化检测方法[J]. 软件学报, 2016, 27(3): 580592[13]Baheti R, Gill H. Cyberphysical systems[J]. The Impact of Control Technology, 2011, 12: 161166[14]Ouchani S, Debbabi M. Specification, verification, and quantification of security in modelbased systems[J]. Computing, 2015, 97(7): 691711[15]彭昆仑, 彭伟, 王东霞, 等. 信息物理融合系统安全问题研究综述[J].信息网络安全, 2016 (7): 2028[16]Edwards S A, Lee E A. The case for the precision timed (PRET) machine[C] Proc of ACMIEEE Design Automation Conf (DAC07). Piscataway, NJ: IEEE, 2007: 264265[17]Mller D P F. Introduction to cyberphysical systems[M] Guide to Computing Fundamentals in CyberPhysical Systems. Berlin: Springer, 2016: 81139[18]何鑫, 郑军, 刘畅. 软件安全性测试研究综述[J]. 计算机测量与控制, 2011, 19(3): 493496[19]韩德帅, 杨启亮, 邢建春. 一种软件自适应UML建模及其形式化验证方法[J]. 软件学报, 2015, 26(4): 730746苏琪
|