共 23 条
- [1] ALLADI T, CHAMOLA V, ZEADALLY S., Industrial control systems:Cyberattack trends and counter-measures[J], Computer Communications, 155, pp. 1-8, (2020)
- [2] GUO Q L, XIN S J, WANG J H, Et al., Comprehensive security assessment for a cyber physical energy system: A lesson from Ukraine’ s blackout[ J], Automation of Electric Power Systems, 40, 5, pp. 145-147, (2016)
- [3] WANG D., Analyze the attack method of ransomware Cerber [ J], Computer and Network, 15, pp. 52-53, (2016)
- [4] SHI Z Y, ZHAO G L, LIU J H., The effect evaluation of the network attack based on the fuzzy comprehensive evaluation method[C], 2016 3rd International Conference on Systems and Informatics (ICSAI), pp. 367-372, (2016)
- [5] LIN J, JIANG R, QI Y L, Et al., Construction of index system based on advanced persistent threat[ C], ITM Web of Conferences, 12, (2017)
- [6] XIAN M, BAO W D, WANG Y J., Introduction to effect evaluation of network attack [ M ], (2007)
- [7] WANG S, SUN L C., Research and implementation of evaluation system for network attack effect based on indicator system[ J], Computer Engineering and Applications, 41, 34, pp. 149-153, (2005)
- [8] ZHAO B F, YIN X C., Research on multidimensional attack effect evaluation method [ J], Computer Engineering and Design, 32, 8, pp. 2596-2599, (2011)
- [9] HU Y, ZHENG K F, YANG Y X., A metric system to evaluate network attack effects based on atomic functions[ J], Computer Engineering & Science, 30, 10, pp. 1-4, (2008)
- [10] NIU Z, MA T, MA C L, Et al., Analysis of the evaluation index for jamming partition battlefield wireless network [ C], 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, pp. 2438-2442, (2019)