共 17 条
- [1] Tong X., Wang X., Inference and countermeasure presupposition of network attack in incident on Ukrainian power grid, Automation of Electric Power Systems, 40, 7, pp. 144-148, (2016)
- [2] Ni M., Yan J., Bai R., Et al., Power system cyber-attack and its defense, Automation of Electric Power Systems, 40, 5, pp. 148-151, (2016)
- [3] Zheng Z., Han B., Shan X., Et al., Analysis on key technologies for coordinated operation of advanced application software in transmission and distribution network, Automation of Electric Power Systems, 41, 6, pp. 122-128, (2017)
- [4] Wang J., Secure information exchange system based on physical isolation technology, (2015)
- [5] Li F., Tan M., Fan K., Et al., Network isolation communication scheme to resist against covert channel, Journal on Communications, 35, 11, pp. 96-106, (2014)
- [6] Sun Y., Gu H., Network isolation of based on buffered dual channel switching technology, Industrial Control Computer, 27, 4, pp. 106-107, (2014)
- [7] Tian X., Qiu Z., Sun C., Et al., Network isolation and switching based on hardware region division and IP packet reintegration, Computer Science, 35, 2, pp. 81-83, (2008)
- [8] Yu H., Wu Y., Hu X., Application of positive-isolation gap in electricity system, Computer & Digital Engineering, 42, 10, pp. 1817-1818, (2014)
- [9] Xue Z., A research of network isolation technique based on information security management, Journal of Shijiazhuang University, 16, 6, pp. 54-58, (2014)
- [10] Wang Y., Yang J., Guo G., Et al., Analysis and prospect of physical isolation technology for network security, Information Security and Communications Privacy, 2, pp. 117-122, (2016)