[1] |
冯涛, 鲁晔, 方君丽. 工业以太网协议脆弱性与安全防护技术综述[J]. 通信学报, 2017, 38(增刊2):185-196 FENG Tao, LU Ye, FANG Junli. Research on vulnerability and security technology of industrial ethernet protocol[J]. Journal on Communications, 2017, 38(S2):185-196
|
[2] |
CHEN T M. Stuxnet, the real start of cyber warfare?[J]. IEEE Network, 2010, 24(6):2-3.
|
[3] |
邹春明, 郑志千, 刘智勇, 等. 电力二次安全防护技术在工业控制系统中的应用[J]. 电网技术, 2013, 37(11):3227-3232 ZOU Chunming, ZHENG Zhiqian, LIU Zhiyong, et al. Application of cyber security in industrial control systems based on security protection technology for electrical secondary system[J]. Power System Technology, 2013, 37(11):3227-3232
|
[4] |
周慎学, 范渊, 夏克晁, 等. 台二电厂工控系统信息安全防护体系的建设[J]. 中国电力, 2017, 50(8):53-57 ZHOU Shenxue, FAN Yuan, XIA Kechao, et al. Construction of information security system for industrial control system in Taizhou 2nd power plant[J]. Electric Power, 2017, 50(8):53-57
|
[5] |
王睿喆, 张建华, 刘文霞. 基于电力系统风险评估的灾害预警量化算法[J]. 南方电网技术, 2015, 9(5):53-58 WANG Ruizhe, ZHANG Jianhua, LIU Wenxia. A quantitative algorithm of disaster warning based on risk assessment of power system[J]. Southern Power System Technology, 2015, 9(5):53-58
|
[6] |
王锦, 潘恒. 基于相似云的网络安全风险评估[J]. 中原工学院学报, 2018, 29(1):67-71 WANG Jin, PAN Heng. Network risk assessment based on the similar cloud[J]. Journal of Zhongyuan University of Technology, 2018, 29(1):67-71
|
[7] |
王滔, 管霖. 基于概率风险评估的直流输电系统短时检修安排[J]. 中国电力, 2015, 48(5):27-30 WANG Tao, GUAN Lin. Short-time maintenance schedule of transmission systems based on probabilistic risk assessment[J]. Electric Power, 2015, 48(5):27-30
|
[8] |
石文辉, 别朝红, 王锡凡. 大型电力系统可靠性评估中的马尔可夫链蒙特卡洛方法[J]. 中国电机工程学报, 2008, 28(4):9-15 SHI Wenhui, BIE Zhaohong, WANG Xifan. Applications of Markov chain Monte Carlo in large-scale system reliability evaluation[J]. Proceedings of the CSEE, 2008, 28(4):9-15
|
[9] |
陈晞, 谢茂清, 高琪瑞. 基于模糊推理的电厂设备通用型故障诊断系统研究[J]. 中国电力, 2003, 36(5):72-75 CHEN Xi, XIE Maoqing, GAO Qirui. Research of general power plant equipment fault diagnosis system based on fuzzy inference[J]. Electric Power, 2003, 36(5):72-75
|
[10] |
李国庆, 翟晓娟. 基于层次分析法的孤立微电网多目标优化运行[J]. 电力系统保护与控制, 2018, 46(10):17-23 LI Guoqing, ZHAI Xiaojuan. Multi-obiective optimal operation of isolated micro-grid based on analytic hierarchy process[J]. Power System Protection and Control, 2018, 46(10):17-23
|
[11] |
韩霞, 郭易鑫, 王晖南, 等. 基于AHP的电力运行信息安全管理风险评估的研究[J]. 国外电子测量技术, 2018, 37(5):32-37 HAN Xian GUO Yixin WANG Huinan, et al. Study on the risk assessment of power operation information security management based on AHP[J]. Foreign Electronic Measurement Technology, 2018, 37(5):32-37
|
[12] |
王羽佳, 李华强, 刘沛清, 等. 基于改进DEAHP模型的支路综合脆弱性评估方法[J]. 电网技术, 2016, 40(4):1249-1256 WANG Yujia, LI Huaqiang, LIU Peiqing, et al. A Branch comprehensive vulnerability assessment method based on improved DEAHP modle[J]. Power System Technology, 2016, 40(4):1249-1256
|
[13] |
沐连顺, 张鹏, 杨赛霓, 等. 国外电力企业风险管理典型案例及其启示[J]. 中国电力, 2012, 45(5):91-96 MU Lianshun, ZHANG Peng, YANG Saini, et al. Typical cases of foreign electricity enterprise risk management[J]. Electric Power, 2012, 45(5):91-96
|
[14] |
龚钢军, 高爽, 陆俊, 等. 地市级区域能源互联网安全可信防护体系研究[J]. 中国电机工程学报, 2018, 38(10):2861-2873 GONG Gangjun, GAO Shuang, LU Jun, et al. Study on secure trusted protection architecture for prefecture-level regional energy internet[J]. Proceedings of the CSEE, 2018, 38(10):2861-2873
|
[15] |
黄家辉, 冯冬芹, 王虹鉴. 基于攻击图的工控系统脆弱性量化方法[J]. 自动化学报, 2016, 42(5):792-798 HUANG Jiahui, FENG Dongqin, WNAG Hongjian. A method for quantifying vulnerability of industrial control system based on attack graph[J]. Acta Automatica Sinica, 2016, 42(5):792-798
|
[16] |
李佳玮, 郝悍勇, 李宁辉. 工业控制系统信息安全防护[J]. 中国电力, 2015, 48(10):139-143 LI Jiawei HAO Hanyong, LI Ninghui. Research on information security protection of industrial control system[J]. Electric Power, 2015, 48(10):139-143
|