[1] |
第十二届全国人大常委会.中华人民共和国网络安全法(草案)[EB/OL]. .
|
|
The Standing Committee of the 12th NPC. People’s republic of China cyber security law (draft)[EB/OL]. .
|
[2] |
BRUMMER E M , SUTER M . CIIP handbook 2008/2009[M]. Beijing: National Defence Industry Press, 2010: 296-300.
|
[3] |
公安部信息安全等级保护评估中心 . 信息安全等级保护政策培训教程[M] 北京: 电子工业出版社, 2010: 45-52.
|
|
MPS Information Classified Security Protection Evaluation Center . Information classified security protection policy training course[M]. Beijing: Publishing House of Electronics Industry, 2010: 45-52.
|
[4] |
马民虎 . 网络安全法律问题及对策研究[M]. 西安: 陕西科学技术出版社, 2007: 171.
|
|
MA M H . Cyber security legal problems and countermeasures research[M]. Xi’an: Shanxi Science and Technology Press, 2007: 171.
|
[5] |
美国通信行业协会 . 保障网络安全:保障关键基础设施和全球供应链的建议[R/OL]. .
|
|
The American Association of Communication Industry . Securing the network: cyber security recommendations for critical infrastructure and the global supply chain[R/OL]. .
|
[6] |
GEORGE R . Critical infrastructure protection[J]. Journal of Healthcare Protection Management Publication of the International Association for Hospital Security 2012, 28 (2): 11-15.
|
[7] |
RICE M , BUTTS J , MILLER R , et al. An analysis of the legality of government-mandated computer inoculations[J]. International Journal of Critical Infrastructure Protection 2010, 3 (1): 5-15.
|
[8] |
CLAVADETSCGER C J . Building national resilience capabilities[J]. International Journal of Critical Infrastructure Protection, 2010, 3 (1): 27-28.
|
[9] |
COHEN F . What makes critical infrastructures critical?[J]. International Journal of Critical Infrastructure Protection, 2010, 3 (3): 53-54.
|
[10] |
MAHONEY W , GANDHI R A . An integrated framework for control system simulation and regulatory compliance monitoring[J]. International Journal of Critical Infrastructure Protection, 2011, 4 (1): 41-53.
|
[11] |
王玥, 方婷, 马民虎 . 美国关键基础设施信息安全监测预警机制演进与启示[J]. 情报杂志, 2016, (1): 17-23.
|
|
WANG Y , FANG T , MA M H . Analysis and enlightenment of the evolution of the US critical infrastructure information security monitoring and warning mechanism[J]. Journal of Intelligence, 2016, (1): 17-23.
|
[12] |
张莉 . 美国保护关键基础设施安全政策分析[J]. 信息安全与技术, 2013, (7): 3-6.
|
|
ZHANG L . The analysis of US policy on protecting critical infrastructure security[J]. Information Security and Technology, 2013, (7): 3-6.
|
[13] |
马民虎 . 信息安全法研究[M]. 西安: 陕西科学技术出版社, 2004: 289.
|
|
MA M H . Information security law research[M]. Xi’an: Shanxi Science and Technology Press, 2004: 289.
|
[14] |
曲洁, 朱建平 . 等级保护与关键基础设施防护的融合研究[J]. 信息安全与技术, 2011: (12) 84-88.
|
|
QU J , ZHU J P . The research of combination of classified protection and critical infrastructure protection[J]. Information Network Security, 2011: (12) 84-88.
|
[15] |
孙丕恕, 加强关键信息基础设施安全保障能力[EB/OL]. .
|
|
SUN P S , Strengthen the security assurance capabilities of critical information infrastructure[EB/OL]. .
|