Citation: | REN Quan, WU Jiangxing, HE Lei, “Performance Modeling Based on GSPN for Cyberspace Mimic DNS,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 738-749, 2020, doi: 10.1049/cje.2020.05.001 |
W.A. Cram, J.G. Proudfoot and J. D'Arcy, “Organizational information security policies: A review and research framework”, European Journal of Information Systems, Vol.26, No.6, pp.605-641, 2016.
|
N.Y. Conteh and P.J. Schmick, “Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks”, International Journal of Advanced Research in Computer Science, Vol.6, No.23, pp.31-38, 2016.
|
R. Zuech, T.M. Khoshgoftaar and R. Wald, “Intrusion detection and big heterogeneous data: A survey”, Journal of Big Data, Vol.2, No.1, pp.3, 2015.
|
P. Hu, H. Li and H. Fu, “Dynamic defense strategy against advanced persistent threat with insiders”, IEEE Conference on Computer Communications, Hong Kong. China, pp.747-755, 2015.
|
T. Fang, L. Shen and W. He, “Distributed control and redundant technique to achieve superior reliability for fully modular input-series-output-parallel inverter system”, IEEE Transactions on Power Electronics, Vol.32, No.1, pp.723-735, 2016.
|
S. Jajodia, A.K. Ghosh and Swarup V., “Moving target defense: Creating asymmetric uncertainty for Cyber threats”, Springer Publishing Company, New York, USA, 2011.
|
J. Wu, “Meaning and vision of mimic computing and mimic security defense”, Telecommunications Science, Vol.30, No.7, pp.2-7, 2014.
|
S. Distefano and L. Xing, “A new approach to modeling the system reliability: Dynamic reliability block diagrams”, Rams'06 Reliability and Maintainability Symposium, IEEE Computer Society, Newport Beach, CA, USA, pp.189-195, 2006.
|
J. Jin, L. Pang and S.Zhao, et al., “Quantitative assessment of probability of failing safely for the safety instrumented system using reliability block diagram method”, Annals of Nuclear Energy, Vol.77, pp.30-34, 2015.
|
B. Nystrom, L. Austrin, N. Ankarback, et al., “Fault tree analysis of an aircraft electric power supply system to electrical actuators”, IEEE International Conference on Probabilistic Methods Applied To Power Systems, Stockholm, Sweden, pp.1-7, 2006.
|
E.E. Hurdle, L.M. Bartlett and J.D. Andrews, “Fault diagnostics of dynamic system operation using a fault tree based method”, Reliability Engineering & System Safety, Vol.94, No.9, pp.1371-1380, 2009.
|
A.H. Ranjbar, M. Kiani and B. Fahimi, “Dynamic Markov model for reliability evaluation of power electronic systems”, IEEE International Conference on Power Engineering, Energy and Electrical Drives, Malaga, Spain, pp.1-6, 2011.
|
K.D. Rao, V. Gopika, V.V.S.S. Rao, et al., “Dynamic fault tree analysis using Monte Carlo simulation in probabilistic safety assessment”, Reliability Engineering & System Safety, Vol.94, No.4, pp.872-883, 2009.
|
J. Dawkins, C. Campbell, J. Hale, “Modeling network attacks: Extending the attack tree paradigm”, Detection Johns Hopkins University, 2002.
|
R. Indrajit and P. Nayot “Using attack trees to identify malicious attacks from authorized insiders”, Lecture Notes in Computer Science, Vol.3679, pp.231-246, 2005.
|
P. Ammann, D. Wijesekera and S. Kaushik, “Scalable, graphbased network vulnerability analysis”, ACM Conference on Computer and Communications Security, CCS 2002, Washington, D.C., USA, pp.217-224, 2002.
|
O. Sheyner, J. Haines, S. Jha, et al., “Automated generation and analysis of attack graphs”, IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp.273, 2002.
|
L.P. Swiler, C. Phillips and T. Gaylor, “A graph-based network-vulnerability analysis system”, Sandia National Laboratories Albuquerque New, USDOE, Washington, USA, pp.97-3010, 1998.
|
T. Li, “An immunity based network security risk estimation”, Science China Information Sciences, Vol.48, No.5, pp.557-578, 2005.
|
C. Lin, “Performance evaluation of computer networks and computer systems”, Tsinghua University Press, Beijing, China, pp.165-181, 2001.
|
J. Shi, Y.X. Meng, S.P. Wang, et al., “Standard Analysis for Transfer Delay in CTCS-3”, Chinese Journal of Electronics, Vol.26, No.5, pp.1057-1063, 2017.
|
J. Shi, Y.X. Meng, S.P. Wang, et al., “Reliability and safety analysis of redundant vehicle management computer system”, Chinese Journal of Aeronautics, Vol.26, No.5, pp.1290-1302, 2013.
|
S.P. Wang, X.Y. Cui, J. Shi, et al., “Modeling of reliability and performance assessment of a dissimilar redundancy actuation system with failure monitoring”, Chinese Journal of Aeronautics, Vol.29, No.3, pp.799-813, 2016.
|
W.C. Moody, H. Hu and A. Apon, “Defensive maneuver cyber platform modeling with stochastic Petri nets”, IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, USA, pp.531-538, 2015.
|
R. Mitchell, I.R. Chen, “Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems”, IEEE Transactions on Reliability, Vol.65, No.1, pp.350-358, 2015.
|
G. Cai, B. Wang, Y. Luo, et al., “A model for evaluating and comparing moving target defense techniques based on generalized stochastic petri net”, Conference on Advanced Computer Architecture, Singapore, pp.194-197, 2016.
|
M. Garcia, A. Bessani, I. Gashi, et al., “Analysis of operating system diversity for intrusion tolerance”, Software—practice & Experience, Vol.44, No.6, pp.735-770, 2014.
|
T.M. Chen, J.C. Sanchez-Aarnoutse and J. Buford, “Petri net modeling of cyber-physical attacks on smart grid”, IEEE Transactions on Smart Grid, Vol.2, No.4, pp.741-749, 2011.
|
R. Mitchell and I.R. Chen, “Effect of intrusion detection and response on reliability of cyber physical systems”, IEEE Transactions on Reliability, Vol.62, No.1, pp.199-210, 2013.
|
M. Ajmone Marsan, G. Conte and G. Balbo, “A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems”, ACM Transactions on Computer Systems, Vol.2, No.2, pp.93-122, 1984.
|