共 17 条
- [1] Guo C., Lu H., Yu B., Et al., A survey of research on security risk assessment of secondary system, Power System Technology, 37, 1, pp. 112-118, (2013)
- [2] Liu N., Yu X., Zhang J., Coordinated cyber-attack: inference and thinking of incident on Ukrainian power grid, Automation of Electric Power Systems, 40, 6, pp. 144-147, (2016)
- [3] Su S., Wu C., Ma J., Et al., Attacker's perspective based analysis on cyber-attack mode to cyber-physical system, Power System Technology, 38, 11, pp. 3115-3120, (2014)
- [4] Chen L., Mei S., Chen Y., Smart grid information security and its influence on power system survivability, Control Theory & Application, 29, 2, pp. 40-44, (2012)
- [5] Peng Y., Jiang C., Xie F., Industrial control system cybersecurity research, Journal of Tsinghua University (Science and Technology), 52, 10, pp. 1396-1408, (2012)
- [6] Duan B., Sun L., SAML based intelligent logging-on system in electric enterprise integration services, Automation of Electric Power Systems, 30, 15, pp. 30-34, (2006)
- [7] Wang B., You D., Yin X., A security risk assessment system of complicated grid based on multiple factor analysis, Power System Technology, 35, 1, pp. 40-45, (2011)
- [8] Liu N., Zhang J., Zhang H., Security assessment for communication networks of power control systems using attack graph and MCDM, IEEE Trans on Power Delivery, 25, 3, pp. 1492-1500, (2010)
- [9] Liu N., Zhang J., Duan B., Vulnerability assessment for communication system of networked based substation automation system, Automation of Electric Power Systems, 32, 8, pp. 28-33, (2008)
- [10] Liu N., Duan B., Discussion on security message of IEC 60870-5-104 telecontrol protocol, Automation of Electric Power Systems, 29, 2, pp. 93-96, (2005)