[1]	华镕. 工业控制系统与信息技术系统的比较[J]. 自动化博览,2014(2):48-49. HUA Rong. Comparison of industrial control systems and IT systems [J]. Automation Panorama 2014(2): 48-49. [2]	余勇,林为民. 工业控制SCADA系统的信息安全防护体系研究[J]. 信息网络安全,2012,51(5):74-77. YU Yong, LIN Weimin. Study on industrial control SCADA system’s information security protection system[J]. Netinfo Security 2012, 51(5): 74-77. [3]	张帅. 工业控制系统安全风险分析[J]. 信息安全与通信保密,2012(3):22-26. ZHANG Shuai. Industrial control systems security risk analysis[J]. Information Security and Communications Privacy, 2012(3):22-26. [4]	ENISA. Protecting industrial control systems[R]. Heraklion:Recommendations for Europe and Member States, 2012: 6-15. [5]	李战宝,张文贵,潘卓. 美国确保工业控制系统安全的做法及对我们的启示[J]. 信息网络安全,2012,51(8):51-53. LI Zhanbao, ZHANG Wengui, PAN Zhuo. American ways of ensuring SCADA security and its revelation to our country [J].Netinfo Security, 2012, 51(8): 51-53. [6]	梁潇,高昆仑,徐志博,等. 美国电力行业信息安全工作现状与特点分析[J]. 电网技术,2011,35(12):226-227. LIANG Xiao, GAO Kunlun, XU Zhibo, et al. A survey on cybersecurity of U.S.electric power industry[J]. Power System Technology, 2011, 35(12): 226-227. [7]	GUO B, ZHANG D, WANG Z. Living with internet of things: the emergence of embedded intelligence[C]//Proc. of the 2011 IEEE International Conference on Cyber, Physical, and Social Computing. Dalian, China: 2011. [8]	冯小安,祁兵. 电力信息系统安全体系的构建[J]. 电网技术,2008,32(S1):77-80. FENG Xiaoan, QI Bing. Security architecture construction for power information systems [J]. Power System Technology, 2008, 32(S1): 77-80. [9]	STOUFFER K, FALCO J, SCARFONE K. Guide to industrial control systems (ICS) security [S]. American: NIST, 2011. [10]	RALSTON P A S. Cyber security risk assessment for SCADA and DCS networks[C]//ISA Transactions 46, 2007: 583-594. [11]	JOYE M. Fast point multiplication on elliptic curves without precomputation[C]//Proc of the 2nd International Workshop on Arithmetic of Finite Fields. 2008.  [12]	赵婷,高昆仑,郑晓崑,等. 智能电网物联网技术架构及信息安全防护体系研究[J]. 中国电力,2012,45(5): 87-90. ZHAO Ting, GAO Kunlun, ZHENG Xiaokun, et al. Research on technical framework and cyber security protection system of IOT in smart grid [J]. Electric Power, 2012, 45(5): 87-90. [13]	王宇飞,徐志博,王婧. 层次化电力信息网络威胁态势评估方法[J]. 中国电力,2013,46(7):121-125. WANG Yufei, XU Zhibo, WANG Jing. Hierarchical cyber-threat situation evaluation method for electric power information network[J]. Electric Power, 2013, 46(7): 121-125. |