[1]ERIC J B, MATTHEW F, DARRIN M. The use of attack trees in assessing vulnerabilities in SCADA systems[C]//International infrastructure survivability workshop. Lisbon (Portugal): IEEE, 2004: 5-6.
[2]MARLON F, MARGARET F, OLGA G, et al. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study[C]//IFIP International Federation for Information Processing 2016. Switzerland: Springer International Publishing, 2016: 326-334.
[3]黄慧萍, 肖世德, 孟祥印. 基于攻击树的工业控制系统信息安全风险评估[J]. 计算机应用研究, 2015, 32(10): 3022-3025.
HUANG Huiping, XIAO Shide, MENG Xiangyin. Attack tree-based method for assessing cyber security risk of industrial control system[J]. Application Research of Computers, 2015, 32(10): 3022-3025.
[4]赵庆, 刘朝晖, 陈智. 基于攻击树的核电厂DCS系统信息安全脆弱性分析[J]. 南华大学学报(自然科学版), 2018, 32(3): 54-59.
ZHAO Qing, LIU Zhaohui, CHEN Zhi. Information security vulnerability analysis of DCS system in nuclear power plant based on attack tree[J]. Journal of University of South China (Science and Technology), 2018, 32(3): 54-59.
[5]SCHNEIER B. Attack trees: Modeling security threats[J]. Dr Dobb’s Journal, 1999, 24(12): 21-29.
[6]国家标准委. 信息安全技术-信息安全风险评估规范: GB/T 20984—2007[S].北京: 中国标准出版社, 2007.
National Standards Committee. Information security technology-risk assessment specification for information security: GB/T 20984—2007[S]. Beijing: Standards Press of China, 2007.
[7]李慧, 张茹, 刘建毅, 等. 基于攻击树模型的数传电台传输安全性评估[J]. 信息网络安全, 2014(8): 71-76.
LI Hui, ZHANG Ru, LIU Jianyi, et al. Safety assessment on digital radio transmission based on attack tree model[J]. Netinfo Security, 2014(8): 71-76. |