[1] 孙舟, 潘鸣宇, 陈振, 等. 电动汽车充电桩自动化渗透测试系统的研究和设计[J]. 中国电力, 2019, 52(1): 57-62, 109 SUN Zhou, PAN Mingyu, CHEN Zhen, et al. Research and design of automatic penetration testing system for electric vehicle charging piles[J]. Electric Power, 2019, 52(1): 57-62, 109 [2] 赵丽莉, 刘忠喜, 孙国强, 等. 基于非线性状态估计的虚假数据注入攻击代价分析[J]. 电力系统保护与控制, 2019, 47(19):38-45. ZHAO Lili, LIU Zhongxi, SUN Guoqiang, et al. Cost analysis of the false data injection attack based on nonlinear state estimation[J]. Power System Protection and Control, 2019, 47(19):38-45. [3] 黄玉洁, 唐作其. 基于改进贝叶斯模型的信息安全风险评估[J]. 计算机与现代化, 2018(4): 95-99, 126 HUANG Yujie, TANG Zuoqi. Information security risk assessment based on improved Bayesian network model[J]. Computer and Modernization, 2018(4): 95-99, 126 [4] Information Technology-Security Techniques—Information Security Management Systems-Requirements: ISO/IEC 27001-2005[S]. [5] BROCKWELL P J, DAVIS R A. 时间序列的理论与方法[M]. 北京: 世界图书出版公司, 2015. [6] 信息安全技术 信息安全风险评估规范: GB/T 20984—2007[S]. 北京: 中国标准出版社, 2007. [7] 信息安全技术 信息安全风险管理指南: GB/Z 24364—2009[S]. 北京: 中国标准出版社, 2009. [8] 信息安全技术 信息安全风险评估实施指南: GB/T 31509—2015[S]. 北京: 中国标准出版社, 2016. [9] 信息技术 安全技术 信息安全风险管理 GB/T 31722—2015[S]. 北京: 中国标准出版社, 2016. [10] 梁智强, 林丹生. 基于电力系统的信息安全风险评估机制研究[J]. 信息网络安全, 2017(4): 86-90 LIANG Zhiqiang, LIN Dansheng. Information security risk assessment mechanism research based on power system[J]. Netinfo Security, 2017(4): 86-90 [11] 杨小宁, 李晓娥. 浅析信息安全风险评估在供电企业的实践[J]. 电力信息化, 2010, 8(2): 26-30 [12] 刘念, 张建华, 张昊. 网络环境下变电站自动化系统的信息资产识别[J]. 电力系统自动化, 2009, 33(13): 53-57 LIU Nian, ZHANG Jianhua, ZHANG Hao. Information asset identification for network-based substation automation systems[J]. Automation of Electric Power Systems, 2009, 33(13): 53-57 [13] 刘柳. 面向SCADA业务的电力通信传输网安全性评估[D]. 北京: 华北电力大学, 2013. LIU Liu. SCADA services oriented security evaluation for electric power communication networks[D]. Beijing: North China Electric Power University, 2013. [14] 齐伟钢, 彭凝多, 黄慧萍. 基于静态贝叶斯博弈的SCADA系统安防策略选择[J]. 通信技术, 2017, 50(9): 2037-2044 QI Weigang, PENG Ningduo, HUANG Huiping. Defense strategy selection based on static Bayesian game for enhancing the cyber security of the SCADA system[J]. Communications Technology, 2017, 50(9): 2037-2044 [15] 郭莹, 吕伟鹏. 电动汽车充电设施建设发展综述[J]. 科技广场, 2013(11): 60-63 GUO Ying, LV Weipeng. Development overview for construction of electric vehicle charging facilities[J]. Science Mosaic, 2013(11): 60-63 [16] WANG Y, HONG Z, LI J, et al. Challenges and future trends for embedded security in electric vehicular communications[C]//IEEE International Conference on Asic. IEEE, 2016. [17] 郭磊, 王克文, 文福拴, 等. 电动汽车充电设施规划研究综述与展望[J]. 电力科学与技术学报, 2019, 34(3):56-70. GUO Lei, WANG Kewen, WEN Fushuan, et al. Review and prospect of charging facility planning of electric vehicles[J]. Journal of Electric Power Science and Technology, 2019, 34(3):56-70. [18] 官嘉玉, 江修波, 刘丽军. 考虑电动汽车随机充电行为及低碳效益的充电站规划[J]. 电力科学与技术学报, 2019, 34(4): 93-100 GUAN Jiayu, JIANG Xiubo, LIU Lijun. Optimal allocation of charging stations considering stochastic charging behavior and low carbon efficiency of electric vehicles[J]. Journal of Electric Power Science and Technology, 2019, 34(4): 93-100
|