Computer Science ›› 2016, Vol. 43 ›› Issue (3): 145-150.doi: 10.11896/j.issn.1002-137X.2016.03.028
Previous Articles Next Articles
WANG You-jun, ZHAO Yun-tian, ZHANG Hong-qi, ZHANG Chuan-fu and YANG Chao
[1] Huang Zhen,Wang Cheng,Nayak A,et al.Small Cluster in Cyber Physical Systems:Network Topology,Interdependence and Cascading Failures [J].IEEE Transactions on Parallel & Distributed Systems,2015,26:2340-2351 [2] Jakobson G.Mission Cyber security situation assessment using impact dependency graphs[C]∥2011 Proceedings of the 14th International Conference on Information Fusion (FUSION).IEEE,2011:1-8 [3] Barnett A,Smith S R,Whittington R P.Using Causal Models to Manage the Cyber Threat to C2 Agility:Working with the Benefit of Hindsight[R].Defence Science and Technology L ab Porton Down(United Kingdom),2014 [4] Neuman C,Tan K.Mediating Cyber and Physical Threat Propagation in Secure Smart Grid Architectures[C]∥2011 IEEE International Conference on IEEE Smart Grid Communications (Smart Grid Comm).2011:238-243 [5] Cheng Yi,Deng Ju-lia,Li J,et al.Cyber Defense and Situational Awareness[M].Springer International Publishing,2014 [6] Halappanavar M,Choudhury S,Hogan E,et al.Towards a network-of-networks framework for cyber security[C]∥2013 IEEE International Conference on IEEE Intelligence and Security Informatics (ISI).2013:106-108 [7] Berge C.Graphes et hypergraphes[M].Dunod,Paris-Brussels-Montreal,Que.,1970 [8] Wang Zhong-tuo.Introduction to System Engineering[M].Bei-jing:Electronic Industry Press,2012(in Chinese) 王众托.系统工程引论[M].北京:电子工业出版社,2012 |
No related articles found! |
|