2Wilhiot K.Who’s really attacking your ICS equipmeent[R].Silicon Valley:Trend Micro Incorporated,2013.
3Stouffer K,Pillitteri V,Lightman S,et al.SP800-82 Guideto indudstrial control systems security[S].Gaithersburg:NIST,2015-05.
4戴汝为.工业控制系统信息安全联盟致辞[R].北京:工业控制信息安全联盟,2014.
5卢慧康.工业控制系统脆弱性测试与风险评估研究[D].上海:华东理工大学,2013:12-13.
6Hadziosmanovic D,Bolzoni D,Etalley S,et al.Challengesand opportunities in securing industrial control system[C]//Proceedings of 2012 IEEE Workshop on Complexity inEngineering,2012:1-2.
7Bezukladnikov I I,Kon E L.Method to counter the threat of covert channels in LonWorks-based industrial controlsystems[C]//Proceedings of the 9th International Conferenceon Application of Information and CommunicationTechnologies(AICT),14-16 Oct,2015:173-177.
8Ashford W.Industrial control system:What are the securitychallenges?[R].London:Tech Target,2014.
9Colella A.Industrial control system cyber threats indicatorsin smart grid technology[C]//Proceedings of the InternationalConference on Network-Based Information Systems,2014:374-380.
10Drias Z,Serhrouchni A,Vogel O.Analysis of cyber securityfor industrial control systems[C]//Proceedings of theInternational Conference on Cyber Security of SmartCities,Industrial Control System and Communications(SSIC),2015:1-8.