[1] |
李正忠 . 电力企业信息安全网络建设原则与实践[J]. 中国新通信, 2015(19): 25-27.
|
|
LI Z Z . Principles and practice of information security network construction in electric power enterprise[J]. China New Telecommunications, 2015(19): 25-27.
|
[2] |
李宇峰, 王晓航 . 田湾河集控中心数据交换平台的应用[J]. 水电自动化与大坝监测, 2013,37(5): 25-28.
|
|
LI Y F , WANG X H . The application of data exchange platform of Tian-Wan-He cascade dispatching center[J]. Hydropower Automation and Dam Monitoring, 2013,37(5): 25-28.
|
[3] |
胡炎, 辛耀中, 韩英铎 . 二次系统安全体系结构化设计方案[J]. 电力系统自动化, 2013,27(21): 63-68.
|
|
HU Y , XIN Y Z , HAN Y D . A method for the structured security architecture design of secondary systems[J]. Automation of Electric Power Systems, 2013,27(21): 63-68.
|
[4] |
张庶 . 供电企业双网隔离工程在南阳供电公司的实施[J]. 电力信息化, 2010,8(6): 39-42.
|
|
ZHANG S . The implementation of the power supply enterprise network isolation project in Nanyang power supply company[J]. Electric Power Information Technology, 2010,8(6): 39-42.
|
[5] |
温兆聪, 王永盛, 白焰辉 . 应用虚拟化技术在电力行业应用研究[J]. 信息技术与信息化, 2015(9): 222-223.
|
|
WEN Z C , WANG Y S , BAI Y H . Research on application of virtualization technology in electric power industry[J]. Information Technology and Informatization, 2015(9): 222-223.
|
[6] |
刘铮, 王静 . 移动办公在发电企业中的研究和应用[J]. 电信科学, 2013,29(11): 115-121.
|
|
LIU Z , WANG J . Research and application of mobile OA technology in power generation enterprise[J]. Telecommunications Science, 2013,29(11): 115-121.
|
[7] |
季君, 杜钧, 师宁 , 等. 基于安全隔离的边界防护体系的设计与实现[J]. 网络安全技术与应用, 2014,8(1): 16-18.
|
|
JI J , DUN J , SHI N , et al. Design and implementation of border protection system based on secure isolation[J]. Network Security Technology & Application, 2014,8(1): 16-18.
|
[8] |
王福新, 罗朝宇, 李宗涛 . 内蒙古电力网络防病毒系统设计及应用[J]. 内蒙古电力技术, 2013,31(5): 72-79.
|
|
WANG F X , LUO Z Y , LI Z T . Design and application of antivirus system in inner Mongolia power network[J]. Inner Mongolia Electric Power, 2013,31(5): 72-79.
|
[9] |
陈新和 . 探讨入侵检测技术在电力信息网络安全中的应用[J]. 通讯世界, 2014,1(1): 67-68.
|
|
CHEN X H . Application of intrusion detection technology in power information network security[J]. Telecom World, 2014,1(1): 67-68.
|
[10] |
李洪涛 . 基于大数据的信息安全预警工作[J]. 城市建设理论研究, 2015,5(36): 35-35.
|
|
LI H T . Early warning of information security based on big data[J]. Urban Construction Theory Research, 2015,5(36): 35-35.
|