[1] |
CATELANI M, CIANI L, VENZI M. RBD Model-Based Approach for Reliability Assessment in Complex Systems[J]. IEEE Systems Journal, 2019, 13(3):2089-2097.
doi: 10.1109/JSYST.4267003
|
[2] |
范洲平. ISO22301:2012业务连续性管理体系标准解读[J]. 中国标准化, 2012(9):76-79.
|
|
FAN Zhouping. Interpretation of ISO 22301:2012 Societal Security-Business Continuity Management Systems-Requirements[J]. China Standardization, 2012(9):76-79.
|
[3] |
杨宏宇, 韩越. 基于动态信誉的无线Mesh网络安全路由机制[J]. 通信学报, 2019, 40(4):195-201.
|
|
YANG Hongyu, HAN Yue. Wireless Mesh Network Secure Routing Mechanism Based on Dynamic Reputation[J]. Journal on Communications, 2019, 40(4):195-201.
|
[4] |
杨宏宇, 王在明. Android共谋攻击检测模型[J]. 通信学报, 2018, 39(6):27-36.
|
|
YANG Hongyu, WANG Zaiming. Android Collusion Attack Detection Model[J]. Journal on Communications, 2018, 39(6):27-36.
|
[5] |
ZOLANVARI M, TEIXEIRA M A, GUPTA L, et al. Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(4):6822-6834.
doi: 10.1109/JIoT.6488907
|
[6] |
HARIYANTI E, DJUNAIDY A, SIAHAAN D O. A Conceptual Model for Information Security Risk Considering Business Process Perspective[C]//Proceedings of the 2018 4th International Conference on Science and Technology (ICST).Yogyakarta:Indonesia, 2018:1-6.
|
[7] |
董慧宇, 唐涛, 王洪伟. 基于二维结构熵的CBTC系统信息安全风险评估方法[J]. 自动化学报, 2019, 45(1):153-162.
|
|
DONG Huiyu, TANG Tao, WANG Hongwei. A 2D Structure Entropy-based Approach to Security Assessment of Communication-based Train Control System[J]. Acta Automatic Sinica, 2019, 45(1):153-162.
|
[8] |
杨宏宇, 王峰岩. 基于无监督多源数据特征解析的网络威胁态势评估[J]. 通信学报, 2020, 41(2):143-154.
|
|
YANG Hongyu, WANG Fengyan. Network Threat Situation Assessment Based on Unsupervised Multi-Source Data Feature Analysis[J]. Journal on Communications, 2020, 41(2):143-154.
|
[9] |
杨宏宇, 张旭高. 基于自修正系数修匀法的网络安全态势预测[J]. 通信学报, 2020, 41(5):196-204.
|
|
YANG Hongyu, ZHANG Xugao. Self-Corrected Coefficient Smoothing Method Based Network Security Situation Prediction[J]. Journal on Communications, 2020, 41(5):196-204.
|
[10] |
SUN Y, WU T Y, LIU X, et al. Multilayered Impact Evaluation Model for Attacking Missions[J]. IEEE Systems Journal, 2016, 10(4):1304-1315.
doi: 10.1109/JSYST.2014.2344048
|
[11] |
MUKHERJEE P, MAZUMDAR C. “Security Concern” as a Metric for Enterprise Business Processes[J]. IEEE Systems Journal, 2019, 13(4) :4015-4026.
doi: 10.1109/JSYST.4267003
|
[12] |
慕彩红, 柴文壹, 刘逸, 等. 一种改进的网络鲁棒性与有效性增强方法[J]. 西安电子科技大学学报, 2018, 45(4):6-11.
|
|
MU Caihong, CHAI Wenyi, LIU Yi, et al. Improved Approach to Enhancing the Robustness and Effectiveness of Networks[J]. Journal of Xidian University, 2018, 45(4):6-11.
|
[13] |
吴俊, 谭跃进, 邓宏钟, 等. 无标度网络拓扑结构非均匀性研究[J]. 系统工程理论与实践, 2007, 27(5):101-105.
|
|
WU Jun, TAN Yuejin, DENG Hongzhong, et al. Heterogeneity of Scale-free Network Topology[J]. Systems Engineering-Theory & Practice, 2007, 27(5):101-105.
|
[14] |
蔡萌, 杜海峰, 任义科, 等. 一种基于点和边差异性的网络结构熵[J]. 物理学报, 2011, 60(11):157-165.
|
|
CAI Meng, DU Haifeng, REN Yike, et al. A New Network Structure Entropy Based Node Differenceand Edge Difference[J]. Acta Physica Sinica, 2011, 60(11):157-165.
|
[15] |
XIE J, GAO J, GAO Z, et al. Modeling and Analysis of Linkage Fluctuation for Industrial Process Based on Complex Network Theory[C]//Proceedings of the 2016 Annual Reliability and Maintainability Symposium (RAMS).Piscataway:IEEE, 2016:1-7.
|
[16] |
VARELA-VACA Á J, PARODY L, GASCA R M, et al. Automatic Verification and Diagnosis of Security Risk Assessments in Business Process Models[J]. IEEE Access, 2019, 7:26448-26465.
doi: 10.1109/Access.6287639
|