[1]DESMIT Z, ELHABASHY A E, WELLS L J, et al. Cyber-physical Vulnerability Assessment in Ma-nufacturing Systems[J].Procedia Manufacturing, 2016, 5: 1060-1074.
[2]KIM S, KIM R Y C, PARK Y B. Software Vulnerability Detection Methodology Combined with Static and Dynamic Analysis[J]. Wireless Personal Communications, 2016, 89(3): 777-793.
[3]DESMIT Z, ELHABASHY A E, WELLS L J, et al. An Approach to Cyber-physical Vulnerability As-sessment for Intelligent Manufacturing Systems[J]. Journal of Manufacturing Systems, 2017, 43:339-351.
[4]UTNE I B, HOKSTAD P, VATN J. A Method for Risk Modeling of Interdependencies in Critical Infrastructures[J]. Reliability Engineering & System Safety, 2011, 96(6):671-678.
[5]KJLLE G H, UTNE I B, GJERDE O. Risk Analysis of Critical Infrastructures Emphasizing Electricity Supply and Interdependencies[J]. Reliability Engineering & System Safety, 2012, 105(3):80-89.
[6]KAEGI M, MOCK R, KR?GER W. Analyzing Maintenance Strategies by Agent-based Simulations: a Feasibility Study[J]. Reliability Engineering & System Safety, 2009, 94(9):1416-1421.
[7]BOMPARD E, NAPOLI R, XUE F. Assessment of Information Impacts in Power System Security Against Malicious Attacks in a General Framework[J]. Reliability Engineering & System Safety, 2009, 94(6):1087-1094.
[8]CAVDAROGLU B, HAMMEL E, MITCHELL J E, et al. Integrating Restoration and Scheduling Decisions for Disrupted Interdependent Infrastructure Systems[J]. Annals of Operations Research, 2013, 203(1):279-294.
[9]ZIO E, FERRARIO E. A framework for the System-of-systems Analysis of the Risk for a Safety-critical Plant Exposed to External events[J]. Reliability Engineering & System Safety, 2013, 114(1):114-125.
[10]KOLLIKKATHARA N, FENG H, YU D. A System Dynamic Modeling Approach for Evaluating Municipal Solid Waste Generation, Landfill Capacity and Related Cost Management Issues[J]. Waste Manage, 2010, 30(11):2194-203.
[11]WANG S L, YUE X. Vulnerability Analysis of Interdependent Infrastructure Systems[J]. Application Research of Computers, 2014, 51(1):328-337.
[12]CHEMINOD M, BERTOLOTTI IC, DURANTE L, et al. On the Analysis of Vulnerability Chains in Industrial Networks[C]// Proceedings of International Workshop on Factory Communication Systems. Torino: IEEE, 2008: 215-224.
[13]KóCZA G, BOSSCHE A. Application of the Integrated Reliability Analysis System[J]. Reliability Engineering & System Safety, 1999, 64: 99-107.
[14]高贵兵,岳文辉,张人龙. 基于状态熵的制造系统结构脆弱性评估方法[J]. 计算机集成制造系统, 2017, 23(10):2211-2220.
GAO Guibing, YUE Wenhui, ZHANG Renlong. Structural Vulnerability Assessment Method of Manufacturing Systems Based on State Entropy[J]. Computer Integrated Manufacturing Systems, 2017, 23(10):2211-2220.
[15]LEVITIN G. The Universal Generating Function in Reliability Analysis and Optimization[M]. London: Springer, 2010.
[16]高贵兵, 岳文辉, 张道兵,等. 基于马尔可夫过程的混流装配线缓冲区容量研究[J]. 中国机械工程,2013, 24(18):2524-2528.
GAO Guibing, YUE Wenhui, ZHANG Daobing, et al. Research on Buffer Capacity for Mixed-model Assembly Lines Based on Markov Process[J]. China Mechanical Engineering, 2013, 24(18):2524-2528. |