2J.C.Laprie. Dependability of Computer Systems : Concepts, Limits, Improvements[J]. Proceedings 6th International Symposium on Fault Tolerant Computing, 1995 : 12-32.PET ER L. Drools Usage Manual, 2004- 01-05.
2STOUFFER K, FALCO J, SCARFONE K. Guide to industrial control systems (ICS) security[M]. National Institute of Standards and Technology, 2011:55-62.
3Client Company. Quarterly report on cyber security incidents and trends affecting industrial control systems[J]. Security Incidents Organization, 2009:35-77.
4Horng Jaojia, Lin Yishu, Shu Chimin. Using consequence analysis on some chlorine operation hazards and their possible effects on neighborhoods in central taiwan[C]. International Conference on the 20th Anniversary of Bhopal Gas Tragedy, The Indian Institute of Technology, 2004:3-12.
5FALCO J, STOUFFER K, WAVERING A, et al. IT security for industrial control systems[M]. National Institute of Standards and Technology, 2001:201-235.
6LAPRIE J C. On the dependability evaluation of high safety systems[C].Proceeding of the 15th International Sym posium on Fault Tolerant Computing, 1985:5-16.
7LAPRIE J C. Dependable computing: concepts, limits, cballenges[J]. In Special Issue FTCS-25. Pasadera. CA. 1995:42-54.
8LAPRIE J C. Dependability of computer systems: concepts, limits,improvements[C]. Proceedings 6th International Sym- posium on Fault Tolerant Computing, 1995:12-32.
9LEVESON N G. Murphy: expecting the worst and prepar- ing for it[M]. The small computer evolution, Arlington,VA, 1984:294-300.
10ZALEWSKI J, SAGLIETYIC F, et al. Safety of computer control systems: challenges and results in software development, Annual Reviews in control, 2003,27 (1): 23- 37.