[1] |
TRAUTMAN L J , ORMEROD P C . Industrial cyber vulnerabilities:lessons from stuxnet and the Internet of Things[J]. Social Science Electronic Publishing, 2017,72: 767-769.
|
[2] |
GEWIRTZ D . Night dragon:cyberwar meets corpoiate espionage,J.Counterter[J]. Homeland Secur Int, 2011,17(2): 6.
|
[3] |
BENCSATH B , PEK G , BUTTYAN L ,et al. The cousins of stuxnet:Duqu,flame,and gauss,Future Int[J]. 2012,4(4): 971-1003.
|
[4] |
MAYNARD P , MCLAUGHLIN K , SEZER S . Modelling duqu 2.0 malware using attack trees with sequential conjunction[C]// Proceedings of the International Conference on Information Systems Security and Privacy. 2016: 465-472.
|
[5] |
SPENNEBERG R , BRUGGEMANN M , SCHWARTKE H . Plcblaster:a worm living solely in the PLC[C]// Black Hat Asia 16, 2016.
|
[6] |
RAVAL S . Blackenergy a threat to industrial control systems network security[J]. International Journal of Advanced Research in Engineering & Technologies. 2015,2(12): 120-125.
|
[7] |
朱朝阳 . 委内瑞拉大停电事故的背后[J]. 国家电网, 2019(5): 72-74.
|
|
ZHU C Y . Behind the blackout in Venezuela[J]. State Grid, 2019(5): 72-74.
|
[8] |
LLOYD A L , MAY R M . Epidemiology:how viruses spread among computers and people[J]. Science, 2001,292(5): 1316-1317.
|
[9] |
COHEN F . Computer viruses:theory and experiments[J]. Computers & Security, 1987,6(1): 22-35.
|
[10] |
STANIFORD S , PAXSON V , WEAVER N . How to own the internet in your spare time[C]// USENIX Security Symposium. 2002: 14-15.
|
[11] |
MARTíN del R A , HERNáNDEZ G , BUSTOS T A ,et al. Advanced malware propagation on random complex networks[J]. Neurocomputing, 2021,423: 689-696.
|
[12] |
HOSSEINI S , ABDOLLAHI A M , RAHMANI T A . Agent-based simulation of the dynamics of malware propagation in scale-free networks[J]. Simulation, 2016,92(7): 709-722.
|
[13] |
KUPENNAN M , ABRAMSON G , NEWMAN M ,et al. Small world effect in an epidemiological model[M]// The Structure and Dynamics of Networks. Princeton University Press, 2011: 489-492.
|
[14] |
AGIZA H N , ELGAZZAR A S , Youssef S A . Phase transitions in some epidemic models defined on small-world networks[J]. International Journal of Modern Physics C, 2003,14(6): 825-833.
|
[15] |
YUAN L . The research on control strategy of worms spread in complex network in industry[J]. Advanced Materials Research, 2012,487: 758-763.
|
[16] |
JUIL C M , LEGAND L B III , JOSEPH I Gill . Modelling the spread of mobile malware[J]. International Journal of Computer Aided Engineering and Technology, 2010,2(1): 3-14.
|
[17] |
SHANG Y . Optimal attack strategies in a dynamic botnet defense model[J]. Applied Mathematics & Information Sciences, 2012,6(1): 29-33.
|
[18] |
KALE A R , SHIRBHATE D D . An advanced hybrid peer-to-peer botnet[J]. International Journal of Wireless Communication, 2012,2(1): 15-19.
|
[19] |
苏飞, 林昭文, 马严 ,等. IPv6 网络环境下的蠕虫传播模型研究[J]. 通信学报, 2011,32(9): 51-60.
|
|
SU F , LIN Z W , MA Y ,et al. Research on worm propagation model in IPv6 networks[J]. Journal on Communications, 2011,32(9): 51-60.
|
[20] |
SEN M D L , NISTAL R , ALONSO-QUESADA S , ,et al. Some formal results on positivity,stability,and endemic steady-state attainability based on linear algebraic tools for a class of epidemic models with eventual incommensurate delays[J]. Discrete Dynamics in Nature and Society, 2019(7): 1-22.
|