References
- Ben-Kalefa, M., Lin, F., 2011. Supervisory control for opacity of discrete event systems. In: Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, IEEE, pp. 1113-1119.
- Bryans, J.W., Koutny, M., Mazare, L., Ryan, P.Y., 2008. Opacity generalised to transition systems. Int. J. Inf. Secur. 7 (6), 421-435. https://doi.org/10.1007/s10207-008-0058-x
- Cassez, F., Dubreil, J., Marchand, H., 2012. Synthesis of opaque systems with static and dynamic masks. Formal Methods Syst. Des. 40 (1), 88-115. https://doi.org/10.1007/s10703-012-0141-9
- Dubreil, J., Darondeau, P., Marchand, H., 2010. Supervisory control for opacity, automatic control. IEEE Trans. 55 (5), 1089-1100.
- Falcone, Y., Marchand, H., 2015. Enforcement and validation (at runtime) of various notions of opacity. Discret. Event Dyn. Syst. 25 (4), 531-570. https://doi.org/10.1007/s10626-014-0196-4
- Jacob, R., Lesage, J.-J., Faure, J.-M., 2015. Opacity of discrete event systems: models, validation and quantification. IFAC-PapersOnLine 48 (7), 174-181.
- Kumari, S., Khan, M.K., 2014. More secure smart card-based remote user password authentication scheme with user anonymity. Secur. Commun. Netw. 7 (11), 2039-2053. https://doi.org/10.1002/sec.916
- Liang, Y., Poor, H.V., et al., 2009. Information theoretic security. Found. Trends Commun. Inf. Theory 5 (4-5), 355-580.
- Lin, F., 2011. Opacity of discrete event systems and its applications. Automatica 47 (3), 496-503. https://doi.org/10.1016/j.automatica.2011.01.002
- Liu, S., Xing, B., Li, B., Gu, M., 2014. Ship information system: overview and research trends. Int. J. Nav. Archit. Ocean Eng. 6 (3), 670-684. https://doi.org/10.2478/IJNAOE-2013-0204
- Mazare, L., 2004. Using unification for opacity properties. In: Proceedings of the 4th IFIP WG1 7, pp. 165-176.
- Rabbachin, A., Conti, A., Win, M.Z., 2015. Wireless network intrinsic secrecy. Netw. IEEE ACM Trans. 23 (1), 56-69. https://doi.org/10.1109/TNET.2013.2297339
- Takai, S., Oka, Y., 2008. A formula for the supremal controllable and opaque sublanguage arising in supervisory control. SICE J. Control Meas. Syst. Integr. 1 (4), 307-311. https://doi.org/10.9746/jcmsi.1.307
- Wang, D., Wang, P., 2014. On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73, 41-57. https://doi.org/10.1016/j.comnet.2014.07.010
- Wu, Y.-C., Lafortune, S., 2012. Enforcement of opacity properties using insertion functions. In: Decision and Control (CDC), 2012 IEEE 51st Annual Conference on. IEEE, pp. 6722-6728.
- Wu, Y.-C., Lafortune, S., 2013. Comparative analysis of related notions of opacity in centralized and coordinated architectures. Discret. Event Dyn. Syst. 23 (3), 307-339. https://doi.org/10.1007/s10626-012-0145-z
- Wu, Y.-C., Lafortune, S., 2014. Synthesis of insertion functions for enforcement of opacity security properties. Automatica 50 (5), 1336-1348. https://doi.org/10.1016/j.automatica.2014.02.038
- Xing, B., Liu, S., Zhu, W., 2015. Actuator channel setting strategy for ship information systems based on reachability analysis and physical characteristic. In: Environment and Electrical Engineering (EEEIC), 2015 IEEE 15th International Conference on. IEEE, pp. 932-937.
- Xing, B., Liu, S., Chen, X., Zhi, P.. Design of sensor data flow for ship information system. Submitted to J. Ship Prod. Des..
Cited by
- Toward Digitalization of Maritime Transport? vol.19, pp.4, 2019, https://doi.org/10.3390/s19040926
- Appraisal of a Ship’s Cybersecurity efficiency: the case of piracy vol.13, pp.3, 2016, https://doi.org/10.1007/s12198-020-00223-1