8LEON D, ALVES-FOSS J, KRINGS A, et al. Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack [EB/OL].[ 2007-11-12]. http:// www. csds. uidaho. edu/papers/ContedeLeon02a. pdf.
9European Workshop on Industrial Computer Systems. Electric power systems cyber security: power substation case study [ EB/OL]. [ 2007-11-01 ]. http://www. ewics. org/attachments/security-subgroup-bps/.
10ORTALO R, DESWARTE Y, KAANICHE M. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans on Software Engineering, 1999, 5(5): 633-650.