[1] 王华忠,陈冬青. 工业控制系统及应用SCADA系统篇[M]. 北京:电子工业出版社, 2017. WANG Huazhong, CHEN Dongqing. Industrial control systems and applications—SCADA system[M]. Beijing:Publishing House of Electronics Industry, 2017. [2] ARGENTI F, LANDUCII G, RENIERS V, et al. Vulnerability assessment of chemical facilities to intentional attacks based on bayesian network[J]. Reliability Engineering & System Safety, 2018, 169:515-530. doi:10.1016/j.ress.2017.09.023 [3] ZHANG Qi, ZHOU Chunjie, TIAN Yuchu, et al. A fuzzy probability bayesian network approach for dynamic cybersecurity risk assessment in industrial control systems[J]. IEEE Transactions on Industrial Informatics, 2018, 14(6):2497-2506. [4] BIAN Nayun, WANG Xiaofang, MAO Li. Network security situational assessment model based on improved AHP_FCE[C]. Hangzhou:International Conference on Advanced Computational Intelligence IEEE, 2013. doi:10.1109/ICACI.2013.6748501 [5] 左海强,陈磊,张忠岩,等. 基于前馈模糊自抗扰的燃气热水器温度控制[J]. 中国石油大学学报(自然科学版), 2022, 46(6):184-190. doi:10.3969/j.issn.16735005.2022.06.022 ZUO Haiqiang, CHEN Lei, ZHANG Zhongyan, et al. Temperature control of gas water heater based on feedforward fuzzy active disturbance rejection[J]. Journal of China University of Petroleum (Edition of Natural Science), 2022, 46(6):184-190. doi:10.3969/j.issn.1673-5005.2022.06.022 [6] 杨肖,杨力,杨子纯. 基于模糊层次分析的工业SCADA安全风险评估方法研究与应用[J]. 计算机应用与软件, 2017, 34(5):54-60. doi:10.3969/j.issn.1000-386x.2017.05.010 YANG Xiao, YANG Li, YANG Zichun. Research and application of industrial SCADA security risk assessment method based on fuzzy AHP[J]. Computer Applications and Software, 2017, 34(5):54-60. doi:10.3969/j.issn.1000-386x.2017.05.010 [7] 龚斯谛. 基于AHP和攻击图的工控系统信息安全风险评估研究[D]. 南昌:南昌航空大学, 2017. GONG Sidi. Research on information security risk assessment of industrial control systems based on AHP and attack graph[D]. Nanchang:Nanchang Hangkong University, 2017. [8] ROY A, KIM D S, TRIVEDI K S. Cyber security analysis using attack countermeasure trees[C]. Oak Ridge:Proceedings of Sixth Annual Cyber Security and Information Intelligence Research Workshop, 2010. doi:10.1145/1852666.1852698 [9] 姚洪磊,刘国梁,解辰辉,等. AHP策略下CTCS网络安全风险评估方法[J]. 中国铁道科学, 2023, 44(4):241-250. doi:10.3969/j.issn.1001-4632.2023.04.23 YAO Honglei, LIU Guoliang, XIE Chenhui, et al. Risk assessment method of CTCS system network security based on AHP[J]. China Railway Science, 2023, 44(4):241-250. doi:10.3969/j.issn.1001-4632.2023.04.23 [10] 林云威,陈冬青,彭勇,等. 基于D-S证据理论的电厂工业控制系统信息安全风险评估[J]. 华东理工大学学报(自然科学版), 2014, 40(4):500-505. doi:10.3969/j.issn.1006-3080.2014.04.016 LIN Yunwei, CHEN Dongqing, PENG Yong, et al. Cyber security risk assessment of industrial control system for power plant using D-S evidence theory[J]. Journal of East China University of Science and Technology (Natural Science Edition), 2014, 40(4):500-505. doi:10.3969/j.issn.1006-3080.2014.04.016 [11] LÜ Huiyang, ZHANG Yuan, LI Huan, et al. Hierarchical WLAN security risk assessment based on D-S evidence theory[C]. Xi'an:International Conference on Computer Network, Electronic and Automation, 2019. [12] 王博爱,杨瑞召,李德伟,等. 基于循环神经网络的微地震有效信号自动识别[J]. 断块油气田, 2021, 28(5):649-654, 690. doi:10.6056/dkyqt202105014 WANG Boai, YANG Ruizhao, LI Dewei, et al. Automatic recognition of effective signals for microseismic based on recurrent neural network[J]. Fault-Block Oil and Gas Field, 2021, 28(5):649-654, 690. doi:10.6056/dkyqt202105014 [13] XU Jiazhu, TONG Guoqing, LIU Yuxing, et al. Research on the risk assessment method of power operation based on fuzzy output neutral network[C]. Thiruvananthapuram:13th Asia Pacific Power & Energy Engineering Conference, 2021. doi:10.1109/APPEEC50844.2021.9687697 [14] 罗凯,王云辉,朱辽宇,等. 基于二维云模型的油气管道环焊缝失效风险评价方法[J]. 世界石油工业, 2023, 30(3):75-81. doi:10.20114/j.issn.1006-0030.20230201001 LUO Kai, WANG Yunhui, ZHU Liaoyu, et al. Failure risk assessment method of girth weld of oil and gas pipeline based on two-dimensional cloud model[J]. World Petroleum Industry, 2023, 30(3):75-81. doi:10.20114/j.issn.1006-0030.20230201001 [15] 刘劲威,曹谢东,徐诗艺,等. 云模型油气SCADA系统信息安全评价研究[J]. 智能系统学报, 2018, 13(2):296-302. doi:10.11992/tis.201609001 LIU Jinwei, CAO Xiedong, XU Shiyi, et al. Research on information security evaluation of oil and gas SCADA system in cloud model[J]. CAAI Transactions on Intelligent Systems, 2018, 13(2):296-302. doi:10.11992/tis.201609001 [16] 赵梦辉. 基于因素空间的油气SCADA系统信息安全评价方法研究[D]. 成都:西南石油大学, 2016. ZHAO Menghui. Research on information security evaluation method for oil and gas SCADA system based on factor space[D]. Chengdu:Southwest Petroleum University, 2016. [17] YANG Li, QIN Hongmei, ZHANG Jan, et al. Cloud model for security state recognition based on factor space[J]. IEEE Sensors Journal, 2021, 21(22):25429-25436. doi:10.1109/JSEN.2021.3098679 [18] ZHOU Z Y, KIZIL M, CHEN Z W, et al. A new approach for selecting best development face ventilation mode based on G1-coefficient of variation method[J]. Journal of Central South University, 2018, 25(10):2462-2471. [19] 李德毅,杜鹢. 不确定性人工智能[M]. 北京:国防工业出版社, 2005. LI Deyi, DU Yi. Artificial intelligence with uncertainty[M]. Beijing:National Defense Industry Press, 2005. [20] 杜湘瑜,尹全军,黄柯棣,等. 基于云模型的定性定量转换方法及其应用[J]. 系统工程与电子技术, 2008, 30(4):772-776. doi:10.3321/j.issn:1001-506X.2008.04.044 DU Xiangyu, YIN Quanjun, HUANG Kedi, et al. Transformation between qualitative variables and quantity based on cloud models and its application[J]. Systems Engineering and Electronics, 2008, 30(4):772-776. doi:10.3321/j.issn:1001-506X.2008.04.044 [21] 中国国家标注委员会. 信息安全技术信息风险评估规范:GB/T 20984—2007[S]. 北京:中国标准出版社, 2007. Standarization Administration of the People's Republic of China. Infomation security technology—Risk assessment specification for infomation security:GB/T 20984—2007[S]. Beijing:Standards Press of China, 2007. [22] 陈永刚,周净毓,戴乾军,等. 基于组合赋权云模型的 LTE R系统的安全评估研究[J]. 铁道科学与工程学报, 2019, 16(12):3110-3118. doi:10.19713/j.cnki.43-1423/u.2019.12.026 CHEN Yonggang, ZHOU Jingyu, DAI Qianjun, et al. Research on LTE-R safety evaluation based on combination weighting method-cloud model[J]. Journal of Railway Science and Engineering, 2019, 16(12):3110-3118. doi:10.19713/j.cnki.43-1423/u.2019.12.026 [23] 中国国家标注委员会. 工业控制网络安全风险评估规范:GB/T26333—2010[S]. 北京:中国标准出版社, 2011. Standarization Administration of the People's Republic of China. Evaluation specification for security in industrial control network:GB/T 263332010[S]. Beijing:Standards Press of China, 2011. [24] 杨力,秦红梅,苏华文. 基于云模型和组合权重的SCADA系统安全风险评估研究[J]. 智能系统学报, 2022, 17(5):969-979. doi:10.11992/tis.202107005 YANG Li, QIN Hongmei, SU Huawen. Research on security risk assessment of SCADA system based on the cloud model and combination weighting[J]. CAAI Transactions on Intelligent Systems, 2022, 17(5):969-979. doi:10.11992/tis.202107005 [25] 吴嘉诚,余晓. 网络安全风险评估方法研究综述[J]. 电子科技, 2024, 37(3):10-17. doi:10.16180/j.cnki.issn1007-7820.2024.03.002 WU Jiacheng, YU Xiao. A review of research on cybersecurity risk assessment methods[J]. Electronic Science and Technology, 2024, 37(3):10-17. doi:10.16180/j.cnki.issn1007-7820.2024.03.002 |