涌现视角下的网络空间安全挑战(15)

来源:系统科学学报 【在线投稿】 栏目:期刊导读 时间:2021-07-30
作者:网站采编
关键词:
摘要:[21] Herley C, Van Oorschot P C. Sok: Science, security and the elusive goal of security as a scientific pursuit[C] //Proc of the 2017 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 201

[21] Herley C, Van Oorschot P C. Sok: Science, security and the elusive goal of security as a scientific pursuit[C] //Proc of the 2017 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2017: 99-120

[22] Such J M, Criado N, Vercouter L, et al. Intelligent cybersecurity agents[J]. IEEE Intelligent Systems, 2016, 31(5): 3-7

[23] Armstrong R, Mayo J, Siebenlist F. Complexity science challenges in cybersecurity, SAND2009—2007[R]. Albuquerque, NM: SAND National Laboratories, 2009

[24] Young W, Leveson N. Inside risks-an integrated approach to safety and security based on system theory: Applying a more powerful new safety methodology to security risks[J]. Communications of the ACM, 2014, 57(2): 232-242

[25] Kriaa S, Pietre-Cambacedes L, Bouissou M, et al. A survey of approaches combining safety and security for industrial control systems[J]. Reliability Engineering & System Safety, 2015, 139: 156-178

[26] Kopetz H, Bondavalli A, Brancati F, et al. Emergence in cyber-physical systems-of-systems (CPSoSs)[M] //Cyber-Physical Systems of Systems. Berlin: Springer, 2016: 73-96

[27] Chuai Yingcai. Research on agent-based simulation DDoS collaborative defense[D]. Zhengzhou: PLA Information University, 2013 (in Chinese)

(揣迎才. 基于Agent的DDoS协同防御仿真研究[D]. 郑州: 中国人民解放军信息工程大学, 2013)

[28] Husted N W. Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices[D]. Bloomington, IN: Indiana University, 2014

[29] Ceccarelli A, Zoppi T, Vasenev A, et al. Threat analysis in systems-of-systems: An emergence-oriented approach[J]. ACM Transactions on Cyber-Physical Systems, 2018, 3(2): No.18

[30] Pfleeger S, Cunningham R. Why measuring security is hard[J]. IEEE Security & Privacy, 2010, 8(4): 46-54

[31] Su Jing, Chan K K W, Miklas A G, et al. A preliminary investigation of worm infections in a bluetooth environment[C] //Proc of the 4th ACM Workshop on Recurring Malcode. New York: ACM, 2006: 9-16

[32] Peng Sancheng, Yu Shui, Yang Aiming. Smartphone malware and its propagation modeling: A survey[J]. IEEE Communications Surveys & Tutorials, 2014, 16(2): 925-941

[33] Lu Zhuo, Wang Wenye, Wang Cliff. On the evolution and impact of mobile botnets in wireless networks[J]. IEEE Transactions on Mobile Computing, 2015, 15(9): 2304-2316

[34] Szongott C, Henne B, Smith M. Evaluating the threat of epidemic mobile malware[C] //Proc of the 8th IEEE Int Conf on Wireless and Mobile Computing, Networking and Communications (WiMob). Piscataway, NJ: IEEE, 2012: 443-450

[35] Husted N, Myers S. Why mobile-to-mobile wireless malware won’t cause a storm[C/OL] //Proc of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). Berkeley, CA: USENIX Association, 2011 [2019-05-24].

[36] Pastor-Satorras R, Vespignani A. Epidemic spreading in scale-free networks[J]. Physical Review Letters, 2001, 86(14): 3200-3203

[37] Lu Zhuo, Wang Wenye, Wang Cliff. How can botnets cause storms? Understanding the evolution and impact of mobile botnets[C] //Proc of the 33rd IEEE Conf on Computer Communications. Piscataway, NJ: IEEE, 2014: 1501-1509

[38] Young W, Leveson N. Systems thinking for safety and security[C] //Proc of the 29th Annual Computer Security Applications Conf. New York: ACM, 2013: 1-8

[39] Friedberg I, McLaughlin K, Smith P, et al. STPA-SafeSec: Safety and security analysis for cyber-physical systems[J]. Journal of Information Security and Applications, 2017, 34(2): 183-196

[40] Khan R, McLaughlin K, Laverty D, et al. STRIDE-based threat modeling for cyber-physical systems[C] //Proc of the 6th IEEE PES Innovative Smart Grid Technologies Conf Europe (ISGT-Europe). Piscataway, NJ: IEEE, 2017: 1-6

[41] Procter S, Vasserman E Y, Hatcliff J. SAFE and secure: Deeply integrating security in a new hazard analysis[C] //Proc of the 12th Int Conf on Availability, Reliability and Security. New York: ACM, 2017: No.66

[42] Nourian A, Madnick S. A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 15(1): 2-13

[43] Rothman K J, Greenland S, Lash T L. Modern Epidemiology[M]. Philadelphia, Pennsylvania: Wolters Kluwer Health, 2008

[44] Holland J H. Complexity: A Very Short Introduction[M]. Oxford, UK: OXFORD Univeristy Press, 2014

[45] Albert R, Barabási A L. Statistical mechanics of complex networks[J]. Reviews of Modern Physics, 2002, 74(1): 47-97

[46] Villeneuve N, dela Torre J, Sancho D. Asprox reborn[EB/OL]. Cupertino, CA: Trend Micro Incorporated, 2013[2019-06-30].

[47] Akritidis P, Chin W Y, Vinh T L, et al. Proximity breeds danger: Emerging threats in metro-area wireless networks[C] //Proc of the 16th USENIX Security Symp. Berkeley, CA: USENIX Association, 2007: 323-338

[48] Gligor V. Security of emergent properties in ad-hoc networks (transcript of discussion)[C] //Proc of the 12th Int Workshop on Security Protocols. Berlin: Springer, 2004: 256-266

文章来源:《系统科学学报》 网址: http://www.xtkxxb.cn/qikandaodu/2021/0730/597.html



上一篇:工程测量开放式虚拟仿真实验系统建设方法研究
下一篇:系统科学视角下提升党员导生培养质量研究以大

系统科学学报投稿 | 系统科学学报编辑部| 系统科学学报版面费 | 系统科学学报论文发表 | 系统科学学报最新目录
Copyright © 2019 《系统科学学报》杂志社 版权所有
投稿电话: 投稿邮箱: