信息网络安全 ›› 2014, Vol. 14 ›› Issue (8): 71-76.doi: 10.3969/j.issn.1671-1122.2014.08.013
• Orginal Article • Previous Articles Next Articles
LI Hui, ZHANG Ru, LIU Jian-yi, ZHAO Jing
Received:
2014-06-19
Online:
2014-08-01
CLC Number:
LI Hui, ZHANG Ru, LIU Jian-yi, ZHAO Jing. Safety Assessment on Digital Radio Transmission based on Attack Tree Model[J]. 信息网络安全, 2014, 14(8): 71-76.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.08.013
[1] Nve Xiao, Peng Wang, Yi Tian, et al. Research and application of Preliminary System Safety Assessment on civil airborne systems[A]. Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE), 2011 International Conference on[C]. Xi’an, China: IEEE, 2011: 562-566. [2] Zhang Dachao, Wen Xiaojun. Assessment of mining area’s environmental system safety by fuzzy logic[A]. Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conference on[C]. Nanjing, China: IEEE, 2011:2971-2975. [3] Ziyan Zhao, Jianming Liu, RuiuiZhang, et al. Research of safety and risk assessment technology for power system communication services[A]. Power System Technology (POWERCON), 2010 International Conference on[C]. HangZhou, China: IEEE, 2010: I-VII. [4] Xin zuo, Huiliang Zhang, Qianjin Deng, et al. Safety assessment of control system based on fuzzy comprehensive evaluation[A]. Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on[C]. Sichuan, China: IEEE, 2012:586-591. [5] Disso J.P., Jones K., Bailey S. A Plausible Solution to SCADA Security Honeypot Systems[A]. Broadband and Wireless Computing, Communication and Application (BWCCA), 2013 Eighth International Conference on[C]. Compiegne, France: IEEE, 2013: 443-448. [6] XU Hong-hua, ZHANG Xu. Security protection strategy of networked SCADA system[J]. Journal of Safety Science and Technology, 2011, 7(011): 164-168. [7] Xue Liang. Optimizing Alarm Placement in Safety Critical Systems[J]. Information Security and Technology, 2012, 3(09): 100-105. [8] Suoto H., Breckenridge M., Hoppe J., et al. Specific Absorption Rate (SAR) safety assessment for Wireless Network after Next (WNaN) radio antennas[A]. Wireless Information Technology and System (ICWITS), 2010 IEEE International Conference on[C]. Honolulu, USA: IEEE, 2010:1-4 [9] Sze K.Y., Keller M.G. Field characterization of an air surveillance radar at near-ground locations[A]. Antenna Technology and Applied Electromagnetics & the American Electromagnetics Conference (ANTEM-AMEREM), 2010 14th International Symposium on[C]. Ottawa, Canada: IEEE, 2010: 1-4 [10] ZHENG Li, LIAO Zhen-lin. Civil Airliner VHF Communication Radio Architecture Based on Safety Assessment[J]. Telecommunication Engineering, 2013, 5(08): 994-1000. [11] Rong Jiang, Rongxing Lu, Ye Wang, et al. Energy-Theft Detection Issues for Advanced Metering Infrastructure in Smart Grid[J]. Tsinghua Science and Technology, 2014, 19(02): 105-120. [12] Ren Dan-dan, DU Su-guo. Novel attack tree based risk assessment approach for location privacy preservation in VANETs[J]. APPLICATION RESEARCH OF COMPUTERS, 2011, 2(02): 728-732. [13] Jie Wang, Phan R.C.-W., Whitley J.N., Parish D.J. Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method[A]. Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on[C]. Bradford, Britain: IEEE, 2010: 1009-1014. [14] Morais A., Martins E., Cavalli A., et al. Security Protocol Testing Using Attack Tree[A]. Computational Science and Engineering, 2009. CSE’09. International Conference on (Volume:2)[C]. Vancouver. BC, Canada: IEEE, 2009: 690-697. [15] Ping Wang, Wen-Hui Lin, Pu-Tsun Kuo, et al. Threat risk analysis for cloud security based on Attack-Defense Trees[A]. Computing Technology and Information Management (ICCM), 2012 8th International Conference on (Volume:1)[C]. Seoul, Korea: IEEE, 2012: 106-111. [16] Yi Xiao, Wang Y.J., Huang Z.G. Survivability analysis of SOA based on attack tree models[A]. Communication Technology (ICCT), 2012 IEEE 14th International Conference on[C]. Chengdu, China: IEEE, 2012: 819-823. [17] Babovic E., Velagic J. Lowering SCADA development and implementation costs using PtP concept[A]. Information, Communication and Automation Technologies, 2009. ICAT 2009. XXII International Symposium on[C]. Bosnia: IEEE, 2009: 1-7. [18] ZHANG Kai-lun, JIANG Quan-yuan. Vulnerability assessment on WAMS communication system based on attack tree model[J]. Power System Protection and Control, 2013, 41(07): 116-122. |
[1] | LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[2] | JIANG Jinfang, HAN Guangjie. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[3] | CHEN Lu, SUN Yajie, ZHANG Liqiang, CHEN Yun. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[4] | GUO Chun, CHEN Changqing, SHEN Guowei, JIANG Chaohui. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[5] | DONG Xiaoli, SHANG Shuai, CHEN Jie. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[6] | WANG Rong, MA Chunguang, WU Peng. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | FU Zhizhou, WANG Liming, TANG Ding, ZHANG Shuguang. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[8] | DU Yifeng, GUO Yuanbo. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[9] | BIAN Lingyu, ZHANG Linlin, ZHAO Kai, SHI Fei. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[10] | LIU Min, CHEN Shuhui. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[11] | ZHAO Zhiyan, JI Xiaomo. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[12] | MA Li. Research on the Quantitative Calculation Method Resulting from the Conclusions in the Assessment of Classified Protection of Cybersecurity [J]. Netinfo Security, 2020, 20(3): 1-8. |
[13] | SONG Yubo, FAN Ming, YANG Junjie, HU Aiqun. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | LI Ning, LI Bochao. Token-based UTM Architecture for Mobile Internet [J]. Netinfo Security, 2020, 20(3): 18-28. |
[15] | ZHOU Quan, YANG Ningbin, XU Shumei. Fault - tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm [J]. Netinfo Security, 2020, 20(3): 29-35. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||