[1]王中杰, 谢璐璐. 信息物理融合系统研究综述[J]. 自动化学报, 2011, 37(10): 11571166[2]温景容, 武穆清, 宿景芳. 信息物理融合系统[J]. 自动化学报, 2012, 38(4): 507517[3]彭昆仑, 彭伟, 王东霞, 等. 信息物理融合系统安全问题研究综述[J]. 信息网络安全, 2016 (7): 2028[4]中国电子技术标准化研究院. 信息物理系统(CPS)安全技术研究[OL]. (20161010) [20170125]. http:wenku.baidu.comlink?url=bgEXHZee3Xvw9UalzkZeAQzADwbpe VrOddXmwbll0wF28vOVdHmUD6ijEnY1uA9w2Ur4dXoc IW_t3TOiJN1OT23_T7LPBl9qTC7g6VlH7aJ14zpp3mFR 8t6lAHdQvS8[5]张恒. 信息物理系统安全理论研究[D]. 杭州: 浙江大学, 2015[6]高静. 信息物理融合系统中基于多模态数据的事件监测问题研究[D]. 哈尔滨: 哈尔滨工业大学, 2015[7]Amin S, Litrico X, Sastry S, et al. Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks[J]. IEEE Trans on Control Systems Technology, 2013, 21(5): 19631970[8]Andersson G, Esfahani P M, Vrakopoulou M, et al. Cybersecurity of SCADA systems[C] Proc of IEEE Pes Innovative Smart Grid Technologies Conf. Piscataway, NJ: IEEE, 2012: 12[9]Rizzetti T A, Wessel P, Rodrigues A S, et al. Cyber security and communications network on SCADA systems in the context of smart grids[C] Proc of Power Engineering Conf. Piscataway, NJ: IEEE, 2015: 16[10]Rdenas A A, Amin S, Lin Z S, et al. Attacks against process control systems: Risk assessment, detection, and response[C] Proc of ACM Symp on Information, Computer and Communications Security. New York: ACM, 2011: 355366[11]孔令霖, 林家骏, 周昆. CPS控制层欺骗攻击检测算法的研究[C] 第7届信息安全漏洞分析与风险评估大会论文集. 长沙: 中国信息安全测评中心, 2014: 469482[12]Garone E, Sinopoli B, Casavola A. LQG control over lossy TCPlike networks with probabilistic packet acknowledgements[J]. International Journal of Systems Control & Communications, 2010, 2(123): 5581[13]Malik W A, Martins N C, Swami A. LQ control under security constraints[M] Control of CyberPhysical Systems. Berlin: Springer, 2013: 101120[14]Berger J. Lecture 2: Bayesian Hypothesis TestingCBMS Conference on Model Uncertainty and Multiplicity[OL]. (20120723) [20170125]. https:cbmsmum.soe.ucsc.edulecture2.pdf
|