[1] 王宇飞,徐志博,王婧. 层次化电力信息网络威胁态势评估方法[J]. 中国电力,2013,46(7):121-125. WANG Yufei, XU Zhibo, WANG Jing. Hierarchical cyber-threat situation evaluation method for electric power information network[J]. Electric Power, 2013, 46(7):121-125.
[2] 苏盛,吴长江,马钧,等. 基于攻击方视角的电力CPS网络攻击模式分析[J]. 电网技术,2014,38(11):3115-3120. SU Sheng, WU Changjiang, MA jun, et al. Perspective based analysis on cyber attack mode to cyber-physical system[J]. Power System Technology, 2014, 38(11):3115-3120.
[3] 翟瑞聪,高雅. 电力设备远程监测诊断中心系统遥视信息联动应用研究[J]. 电力系统保护与控制,2015,43(8):150-154. ZHAI Ruicong, GAO Ya. Research on application of remote video information linkage of the power equipment monitoring and diagnosis center system[J]. Power System Protection and Control, 2015, 43(8):150-154.
[4] FARWELL J P, ROHOZINSKI R. Stuxnet and the future of cyber war[J]. Survival, 2011, 53(1):23-40.
[5] 金波,肖先勇,陈晶,等. 考虑保护失效和电网动态平衡特性的连锁故障风险评估[J]. 电力系统保护与控制,2016,44(8):1-7. JIN Bo, XIAO Xianyong, CHEN Jing, et al. A method of risk assessment considering protection failures and dynamic equilibrium of power grid[J]. Power System Protection and Control, 2016, 44(8):1-7.
[6] 刘仲,牟龙华,杨智豪. 大停电后含分布式电源的电网分区及负荷恢复方案[J]. 电力系统保护与控制,2015,43(22):55-61. LIU Zhong, MU Longhua, YANG Zhihao. Scheme for partitioning and load restoration of power grid containing distributed generation after blackout[J]. Power System Protection and Control, 2015, 43(22):55-61.
[7] 张帅. 对APT攻击的检测与防御[J]. 信息安全与技术,2011, 2(9):125-127. ZHANG Shuai. The Detection and defense about APT attack[J].Information Securiy and Technology, 2011, 2(9):125-127.
[8] MELL P, SCARFONE K, ROMANOSKY S. Common vulnerability scoring system[J]. IEEE Security & Privacy, 2006, 4(6):85-89.
[9] FRUHWIRTH C, MANNISTO T. Improving CVSS-based vulnerability prioritization and response with context information[C]//International Symposium on Empirical Software Engineering and Measurement. IEEE Computer Society, 2009:535-544.
[10] 刘奇旭,张翀斌,张玉清,等. 安全漏洞等级划分关键技术研究[J]. 通信学报,2012,33(S1):79-87. LIU Qixu, ZHANG Chongbin, ZHANG Yuqing, et al. Research on key technology of vulnerability threat classification[J]. Journal on Communications, 2012, 33(S1):79-87.
[11] 周亮,李俊娥,陆天波,等. 信息系统漏洞风险定量评估模型研究[J]. 通信学报,2009,30(2):71-76. ZHOU Liang, LI Jun'e, LU Tianbo, et al. Research on quantitative assessment model on vulnerability risk for information system[J]. Journal on Communications, 2009, 30(2):71-76.
[12] 李文武,游文霞,王先培. 电力系统信息安全研究综述[J]. 电力系统保护与控制,2011,39(10):140-147. LI Wenwu, YOU Wenxia, WANG Xianpei. Survey of cyber security research in power system[J]. Power System Protection and Control, 2011, 39(10):140-147.
[13] SAATY T L, VARGAS L G. Models, methods, concepts & applications of the analytic hierarchy process[M]. Kluwer Acdemic Publishers, 2012.
[14] 李鑫,李京春,郑雪峰,等. 一种基于层次分析法的信息系统漏洞量化评估方法[J]. 计算机科学,2012,39(7):58-63. LI Xin, LI Jingchun, ZHENG Xuefeng, et al. Analytic hierarchy process (AHP)-based vulnerability quantitative assessment method for information systems[J]. Computer Science, 2012, 39(7):58-63. |