1 |
HackASat. Space security challenge 2020: HACK-A-SAT[EB/OL]. [2021-01-20]. https://www.hackasat.com/.
|
2 |
YANG S L, CAO S Z, WEI J Y, et al. Space-based computing platform based on SoC FPGA[C]//Proc. of the IEEE World Congress on Services, 2019: 172-177.
|
3 |
陈建光, 王聪, 梁晓莉. 国外软件定义卫星技术进展[J]. 卫星与网络, 2018, (4): 50- 53.
|
|
CHEN J G , WANG C , LIANG X L . Overseas progress on technology of software-defined satellites[J]. Satellites and Networks, 2018, (4): 50- 53.
|
4 |
PAVUR J, MARTINOVIC I. The cyber-ASAT: on the impact of cyber weapons in outer space[C]//Proc. of the International Conference on Cyber Conflict, 2019. DOI: 10.23919/CYCON.2019.8756904.
|
5 |
KAPALIDIS C, FISHER M. Cyber risk management in satellite systems[C]//Proc. of the Living in the Internet of Things, 2019. DOI: 10.1049/cp.2019.0139.
|
6 |
BICHLER S F . Mitigating cyber security risk in satellite ground systems[J]. Computer Science, 2015,
doi: 10.21236/ad1012754
|
7 |
ULICNY B E, MOSKAL J J, KOKAR M M, et al. Inference and ontologies[M]//Advances in information security. Switzerland: Springer, 2014: 167-199.
|
8 |
SCARPATO N , CILIA N D , ROMANO M . Reachability matrix ontology: a cybersecurity ontology[J]. Applied Artificial Intelligence, 2019, 33 (7): 643- 655.
doi: 10.1080/08839514.2019.1592344
|
9 |
NOEL S, HARLEY E, TAM K H, et al. CyGraph: graph-based analytics and visualization for cybersecurity[M]//GUDIVADA V N, RAGHAVAN V V, GOVINDARAJU V, et al. Handbook of statistics. Amsterdam: Elsevier, 2016.
|
10 |
KIM H , KWON H J , KIM K K . Modified cyber kill chain model for multimedia service environments[J]. Multimedia Tools and Applications, 2019, 78 (3): 3153- 3170.
doi: 10.1007/s11042-018-5897-5
|
11 |
SYED Z, PADIA A, FININ T W, et al. UCO: a unified cybersecurity ontology[C]//Proc. of the AAAI Workshop on Artificial Intelligence for Cyber Security, 2016: 195-202.
|
12 |
JIA Y , QI Y L , SHANG H J , et al. A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018, 4 (1): 117- 133.
|
13 |
FRUH C, JAH M, VALDEZ E, et al. Taxonomy and classification scheme for artificial space objects[R]. White Patterson Air Force Base, Ohio: Air Force Research Laboratory, Space Vehicles Directorate, 2013: 1-13.
|
14 |
COX A P, NEBELECKY C K, RUDNICKI R, et al. The space object ontology[C]//Proc. of the 19th International Conference on Information Fusion, 2016.
|
15 |
ROVETTO R J, KELSO T. Preliminaries of a space situational awareness ontology[C]//Proc. of the 26th AAS/AIAA Space Flight Mechanics Meeting, 2016.
|
16 |
ROVETTO R J . An ontology for satellite databases[J]. Earth Science Informatics, 2017, 10 (4): 417- 427.
doi: 10.1007/s12145-017-0290-x
|
17 |
LIU B , YAO L , HAN D P . Harnessing ontology and machine learning for RSO classification[J]. SpringerPlus, 2016, 5, 1655.
|
18 |
刘斌. 基于本体的多源信息融合空间目标识别方法研究[D]. 长沙: 国防科技大学, 2018.
|
|
LIU B. Research on multi-source information fusion based on ontology for RSO recognition[D]. Changsha: National University of Defense Tecchnology, 2018.
|
19 |
姜连祥, 李华旺, 杨根庆. 卫星自主故障诊断专家系统中知识库的设计[J]. 航天控制, 2009, (5): 93- 97.
|
|
JIANG L X , LI H W , YANG G Q . Design knowledge base in expert system of autonomous fault diagnosis for satellites[J]. Spaceflight Control, 2009, (5): 93- 97.
|
20 |
程卓, 朱北园, 谷岩, 等. 卫星产品FMEA存在的问题及改进建议[J]. 质量与可靠性, 2011, (3): 24- 28.
|
|
CHENG Z , ZHU B Y , GU Y , et al. Problems in FMEA of satellites product and suggestions for improvements[J]. Quality & Reliability, 2011, (3): 24- 28.
|
21 |
STROM B. Adversarial tactics, techniques and common knowledge-ATT & CKTM[R]. Virginia: MITRE, 2015.
|
22 |
OLTRAMARI A, CRANOR L F, WALLS R J, et al. Building an ontology of cyber security[C]//Proc. of the 9th Conference on Semantic Technology for Intelligence, Defense, and Security, 2014: 54-61.
|
23 |
IANNACONE M D, BOHN S, NAKAMURA G, et al. Deve-loping an ontology for cyber security knowledge graphs[C]//Proc. of the 10th Annual Cyber and Information Security Research Conference, 2015. DOI: 10.1145/2746266.2746278.
|
24 |
MOZZAQUATRO B A , AGOSTINHO C , GONCALVES D , et al. An ontology-based cybersecurity framework for the internet of things[J]. Sensors, 2018, 18 (9): 3053.
|
25 |
MANULIS M , BRIDGES C P , HARRISON R , et al. Cyber security in new space: analysis of threats, key enabling technologies and challenges[J]. International Journal of Information Security, 2020, 20 (3): 287- 311.
|
26 |
BAILEY B, SPEELMAN R J, DOSHI P A, et al. Defending spacecraft in the cyber domain[R]. El Segundo, California: The Center for Space Policy and Strategy, 2019.
|
27 |
MICHAEL G, FOX M S. Methodology for the design and eva-luation of ontologies[C]//Proc. of the IJCAI-95 Workshop on Basic Ontological Issues in Knowledge Sharing, 1995.
|
28 |
Acoinfo. Source code archives[EB/OL]. [2021-01-20]. http://www.sylixos.com/.
|
29 |
RAZA A, SOHAL P, CADDEN J, et al. Unikernels: the next stage of Linux's dominance[C]//Proc. of the Workshop on Hot Topics in Operating Systems, 2019: 7-13.
|
30 |
Wikimedia Foundation. SpaceX Dragon 2[EB/OL]. [2021-01-20]. https://en.wikipedia.org/wiki/SpaceX_Dragon_2.
|
31 |
BARDIN J . Satellite cyber attack search and destroy[M]. Amsterdam: Elsevier, 2014.
|
32 |
MUYLAERT J, MONTE L D. Cyber security of space mi-ssions[R]. Leuven, Belgium: Energy Services Of America Corporation, 2018.
|
33 |
FOXNews. Black hat hacker says he accessed 'hundreds' of aircraft already in the sky[EB/OL]. [2021-01-20]. https://www.foxnews.com/tech/black-hat-hacker-says-he-accessed-hundreds-of-aircraft-already-in-the-sky.
|