共 11 条
[3]
The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety”[J] . Ludovic Piètre-Cambacédès,Claude Chaudet.International Journal of Critical Infrastructure Protection . 2010 (2)
[4]
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements[J] . Sandip C. Patel,James H. Graham,Patricia A.S. Ralston.International Journal of Information Management . 2008 (6)
[5]
Gene Selection for Cancer Classification using Support Vector Machines
[J].
Machine Learning,
2002, 46
:389-422
[6]
W32.Stuxnet Dossier,Version 1.3Edition. Nicolas F,Liam O M,Eric C. . 2010
[7]
Multiple Efforts to Secure Control Systems Are Under Way,but Challenges Remain. David A. GAO-07-1036 . 2007
[8]
Snort 2.0Intrusion Detection Syngress. Jay B,James C F,Jeffrey P,et al. http://security.irost.org/ebooks . 2003
[9]
National SCADA Testbed[Z/OL]. Department of Energy. http://www.doe.gov/oe/national-scada-test-bed . 2012
[10]
National Infrastructure Protection Plan. Department of Homeland Security. . 2009