共 29 条
[2]
Amoah R, 2014, IEEE ICC, P827, DOI 10.1109/ICC.2014.6883422
[3]
[Anonymous], 2007, Power Systems Management and Associated Information Exchange-Data and Communications Security Part 1: Communication Network and System SecurityIntroduction to Security Issues
[4]
Byres E, 2013, COMMUN ACM, V56, P29, DOI 10.1145/2492007.2492018
[6]
Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
[J].
COMPUTER SECURITY - ESORICS 2017, PT I,
2018, 10492
:389-407
[8]
Dutertre B, 2008, INT FED INFO PROC, V253, P189
[9]
Edmonds Janica., 2008, Critical Infrastructure Protection, volume 253 of IFIP International Federation for Information Processing, V253, P205, DOI DOI 10.1007/978-0-387-75462-8_15
[10]
A Survey of Security in SCADA Networks: Current Issues and Future Challenges
[J].
IEEE ACCESS,
2019, 7
:135812-135831