[1] E-ISAC, Washington DC. Analysis of the cyber attack on the Ukrainian Power Grid [R]. 2016-03-18. [2] 安天科技,北京四方继保,复旦大学. 乌克兰电力系统遭受攻击事件综合分析报告 [R]. 2016-02-24. [3] 刘念,余星火,张建华. 网络协同攻击:乌克兰停电事件的推演与启示[J].电力系统自动化,2016,40(6):144-147. LIU Nian, YU Xinghuo, ZHANG Jianhua. Coordinated cyber- attack: inference and thinking of incident on Ukrainian power grid[J]. Automation of Electric Power Systems, 2016, 40(6): 144-147. [4] 童晓阳,王晓茹. 乌克兰停电事件引起的网络攻击与电网信息安全防范思考[J]. 电力系统自动化,2016,40(7):144-148. TONG Xiaoyang, WANG Xiaoru. Inference and countermeasure presuppostion of network attack in incident on Ukrainian power grid [J]. Automation of Electric Power Systems, 2016, 40(7): 144-148. [5] LANGNER R. Stuxnet: dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy Magazine, 2011, 9(3): 49-51. [6] 李中伟,佟为明,金显吉. 智能电网信息安全防御体系与信息安全测试系统构建:乌克兰和以色列国家电网遭受网络攻击事件的思考与启示[J]. 电力系统自动化,2016,40(8):147-151. LI Zhongwei, TONG Weiming, JIN Xianji. Construction of cyber security defense hierarchy and cyber security testing system of smart grid: thinking and enlightenment for network assaulting events to national power grid of Ukraine and Israel [J]. Automation of Electric Power Systems, 2016, 40(8): 147-151. [7] 黄全权. 2020年建成统一的“坚强智能电网”[J]. 国家电网, 2009(6):29-29. HUANG Quanquan. Construction of uniform“strong smart grid” in 2020 [J]. State Grid, 2009(6): 29-29. [8] TUCKER Patrick. Ukrainian power company‘99% Certain’ blackout result of cyber attack [EB/OL]. (2016-12-21) http://www.defenseone.com/technology/2016/12/ukrainian-power-company-99-certain-blackout-result-cyber-attack/134099/?oref=d-river. [9] 宋艾米,曹奇英. 基于目标管理的社会工程学模型研究[J]. 计算机科学,2012,39(S3):41-44. SONG Aimi, CAO Qiying. Research on social engineering model based oil objective management[J]. Computer Science, 2012, 39(S3): 41-44. [10] KANG B. Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations[C]//2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), Luxembourg, 2015: 1-8. [11] SINGH S, SILAKARI S. An ensemble approach for cyber attack detection system: a generic framework[C]// 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Honolulu, HI, 2013: 79-84. [12] 汤涌.电力系统安全稳定综合防御体系框架[J]. 电网技术,2012,36(8):1-5. TANG Yong. Framework of comprehensive defense architecture for power system security and stability[J]. Power System Technology, 2012, 36(8): 1-5. [13] 李文武,游文霞,王先培,等. 电力系统信息安全研究综述[J].电力系统保护与控制,2011,39(10):140-147. LI Wenwu, YOU Wenxia, WANG Xianpei, et al . Review of research on information security of power system [J]. Power System Protection and Control, 2011, 39(10): 140-147. [14] 李再华. 利用物理隔离技术保障电网信息系统安全[J]. 电力系统装备,2008(2):74-77. LI Zaihua. Securing the information system of power grid using physical isolation technology[J]. Electric Power System Equipment, 2008(2): 74-77. [15] 周挺,周文俊. 电力调度人员业务承载力分析方法研究[J]. 华东电力,2014,42(9):1893-1896. ZHOU Ting, ZHOU Wenjun. Analysis method for business bearing capacity of power dispatching personnal[J]. East China Electric Power, 2014, 42(9): 1893-1896. [16] 王怀宇,王栋. 大型企业高体验度高安全性电子邮件系统设计思路[J]. 电力信息与通信技术,2015,13(8):45-49. WANG Huaiyu, WANG Dong. The design concept of good user experience and high security e-mail system for enterprise[J]. Electric Power Information and Communication Technology, 2015, 13(8): 45-49. [17] 余勇,林为民. 工业控制SCADA系统的信息安全防护体系研究[J]. 信息网络安全,2012(5):74-77. YU Yong, LIN Weimin. Study on industrial control scada system’s information security protection system [J]. Information Network Security, 2012(5): 74-77. [18] 朱晓燕,方泉. 美国电力行业信息安全运作机制和策略分析[J]. 中国电力,2015,48(5):81-88. ZHU Xiaoyan, FANG Quan. Study on mechanism and strategy of cyber security in U.S. electric power industry[J]. Electric Power,2015, 48(5): 81-88. |