涌现视角下的网络空间安全挑战(18)

来源:系统科学学报 【在线投稿】 栏目:期刊导读 时间:2021-07-30
作者:网站采编
关键词:
摘要:[107] Davis M C, Challenger R, Jayewardene D N W, et al. Advancing socio-technical systems thinking: A call for bravery[J]. Applied Ergonomics, 2014, 45(2): 171-180 [108] de Haan J. How emergence aris

[107] Davis M C, Challenger R, Jayewardene D N W, et al. Advancing socio-technical systems thinking: A call for bravery[J]. Applied Ergonomics, 2014, 45(2): 171-180

[108] de Haan J. How emergence arises[J]. Ecological Complexity, 2006, 3(4): 293-301

[109] Xu Shouhuai. Cybersecurity dynamics[J]. arXiv preprint arXiv:, 2015

[110] Xu Shouhuai. Cybersecurity dynamics: A foundation for the science of cyber security[M] //Proactive and Dynamic Network Defense. Berlin: Springer, 2018: 1-31

[111] Leveson N G. CAST analysis of the shell Moerdijk accident[R/OL]. Cambridge, MA: MIT Press, 2016 [2019-06-10].

[112] Yan Guanhua, Eidenbenz S. Modeling propagation dynamics of bluetooth worms (extended version) [J]. IEEE Transactions on Mobile Computing, 2009, 8(3): 353-368

[113] Cunningham C, Roque A. Adapting an agent-based model of socio-technical systems to analyze security failures[C] //Proc of the 17th IEEE Int Symp on Technologies for Homeland Security. Piscataway, NJ: IEEE, 2017: No.18

[114] Charitoudi K, Blyth A J C. An agent-based socio-technical approach to impact assessment for cyber defense[J]. Information Security Journal: A Global Perspective, 2014, 23(4/5/6): 125-136

[115] Tandon A, Karlapalem K. Medusa: Towards simulating a multi-agent hide-and-seek game[C] //Proc of the 27th Int Joint Conf on Artificial Intelligence and the 23rd European Conf on Artificial Intelligence. San Diego, CA: International Joint Conferences on Artificial Intelligence, 2018: 5871-5873

[116] Magkos E, Avlonitis M, Kotzanikolaou P, et al. Toward early warning against Internet worms based on critical-sized networks[J]. Security and Communication Networks, 2013, 6(1): 78-88

[117] Morales J A, Al-Bataineh A, Xu Shouhuai, et al. Analyzing and exploiting network behaviors of malware[C] //Proc of the 2nd Int Conf on Security and Privacy in Communication Systems. Berlin: Springer, 2010: 20-34

[118] Octeau D, McDaniel P, Jha S, et al. Effective inter-component communication mapping in Android: An essential step towards holistic security analysis[C] //Proc of the 22nd USENIX Security Symp. Berkeley, CA: USENIX Association, 2013: 543-558

[119] Blyth A. Understanding security patterns for socio-technical systems via responsibility modelling[C] //Proc of the 8th IEEE Int Symp on Service Oriented System Engineering. Piscataway, NJ: IEEE, 2014: 417-421

[120] Datta A, Franklin J, Garg D, et al. On adversary models and compositional security[J]. IEEE Security & Privacy, 2010, 9(3): 26-32

[121] Conti M, Di Pietro R, Mancini L V, et al. Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks[C] //Proc of the 1st ACM Conf on Wireless Network Security. New York: ACM, 2008: 214-219

[122] Underwood P, Waterson P. Systemic accident analysis: Examining the gap between research and practice[J]. Accident Analysis & Prevention, 2013, 55: 154-164

[123] Carayon P, Hancock P, Leveson N, et al. Advancing a sociotechnical systems approach to workplace safety-developing the conceptual framework[J]. Ergonomics, 2015, 58(4): 548-564

[124] Leveson N G. Rasmussen’s legacy: A paradigm change in engineering for safety[J]. Applied Ergonomics, 2017, 59: 581-591

[125] Anderson B R. Improving health care by embracing systems theory[J]. The Journal of Thoracic and Cardiovascular Surgery, 2016, 152(2): 593-594

[126] Sterman J D. System dynamics modeling: Tools for learning in a complex world[J]. California Management Review, 2001, 43(4): 8-25

[127] Dorogovtsev S N, Mendes J F F. Evolution of networks[J]. Advances in Physics, 2002, 51(4): 1079-1187

[128] Cucker F, Smale S. On the mathematics of emergence[J]. Japanese Journal of Mathematics, 2007, 2(1): 197-227

[129] Crutchfield J P. The calculi of emergence: Computation, dynamics and induction[J]. Physica D: Nonlinear Phenomena, 1994, 75(1/2/3): 11-54

[130] Collier N. Repast: An extensible framework for agent simulation[J]. Natural Resources and Environmental Issues, 2001, 8: 17-21

[131] Tisue S, Wilensky U. NetLogo: A simple environment for modeling complexity[C] //Proc of the 5th Int Conf on Complex Systems. Trieste, Italy: The World Academy of Sciences, 2004: 16-21

[132] Thomas IV J P. Extending and automating a systems-theoretic hazard analysis for requirements generation and analysis[D]. Cambridge, MA: Massachusetts Institute of Technology, 2013

文章来源:《系统科学学报》 网址: http://www.xtkxxb.cn/qikandaodu/2021/0730/597.html



上一篇:工程测量开放式虚拟仿真实验系统建设方法研究
下一篇:系统科学视角下提升党员导生培养质量研究以大

系统科学学报投稿 | 系统科学学报编辑部| 系统科学学报版面费 | 系统科学学报论文发表 | 系统科学学报最新目录
Copyright © 2019 《系统科学学报》杂志社 版权所有
投稿电话: 投稿邮箱: