[1] |
周慎学, 范渊, 夏克晁 ,等. 台二电厂工控系统信息安全防护体系的建设[J]. 中国电力, 2017,50(8): 53-57.
|
|
ZHOU S X , FAN Y , XIA K C ,et al. Construction of information security protection system for industrial control system in Taizhou 2nd power plant[J]. Electric Power, 2017,50(8): 53-57.
|
[2] |
王波, 王威, 李丰伟 . 电网集中监控下海量信息导致的安全风险及应对策略[J]. 中国电力, 2015,48(12): 27-32.
|
|
WANG B , WANG W , LI F W . Research on grid security risk and response strategies on centralized monitoring of massive information[J]. Electric Power, 2015,48(12): 27-32.
|
[3] |
张瑞敏, 冯建民 . 信息安全及其在电力系统中的应用[J]. 中国电力教育, 2012(z2): 458-459.
|
|
ZHANG R M , FENG J M . Research on grid security risk and response strategies on centralized monitoring of massive information[J]. China Electric Power Education, 2012(z2): 458-459.
|
[4] |
朱晓燕, 方泉 . 美国电力行业信息安全运作机制和策略分析[J]. 中国电力, 2015,48(5): 81-88.
|
|
ZHU X Y , FANG Q.Study on mechanism and strategy of cyber security in U.S . electric power industry[J]. Electric Power, 2015,48(5): 81-88.
|
[5] |
赵婷, 高昆仑, 郑晓崑 ,等. 智能电网物联网技术架构及信息安全防护体系研究[J]. 中国电力, 2012,45(5): 87-90.
|
|
ZHAO T , GAO K L , ZHENG X K ,et al. Research on technical framework and cyber security protection system of IoT in smart grid[J]. Electric Power, 2012,45(5): 87-90.
|
[6] |
何蕾 . 基于改进 PDRR 模型的电力企业网络安全模型研究[D]. 北京:华北电力大学, 2015.
|
|
HE L . Research on power enterprise network security model based on improved PDRR model[D]. Beijing:North China Electric Power University, 2015.
|
[7] |
付沙, 宋丹 . 基于AHP和模糊综合评判的信息安全风险评估方法[J]. 实验室研究与探索, 2012,31(6): 207-210.
|
|
FU S , SONG D . An information security risk assessment method based on AHP and fuzzy comprehensive evaluation[J]. Research and Exploration in Laboratory, 2012,31(6): 207-210.
|
[8] |
吴文刚, 张志文, 王庆生 . 基于模糊综合评判和AHP信息安全风险评估模型[J]. 重庆理工大学学报(自然科学版), 2017,31(7): 156-161.
|
|
WU W G , ZHANG Z W , WANG Q S . A information security risk assessment model based on AHP and fuzzy comprehensive evaluation[J]. Journal of Chongqing Institute of Technology (Natural Science), 2017,31(7): 156-161.
|
[9] |
杨肖, 杨力, 杨子纯 . 基于模糊层次分析的工业 SCADA 安全风险评估方法研究与应用[J]. 计算机应用与软件, 2017,34(5): 54-60.
|
|
YANG X , YANG L , YANG Z C . Research and application of industrial SCADA security risk assessment method based on fuzzy AHP[J]. Computer Applications and Software, 2017,34(5): 54-60.
|
[10] |
姚晓勇, 徐略红, 黄华平 ,等. 电力企业信息安全防护体系的构建与实现[J]. 自动化技术与应用, 2018,37(9): 150-155.
|
|
YAO X Y , XU L H , HUANG H P ,et al. Establishment and implementation of information security protection system in power enterprises[J]. Techniques of Automation and Applications, 2018,37(9): 150-155.
|
[11] |
李冰霞 . 电力信息网络安全态势评估与预测方法研究[D]. 保定:华北电力大学, 2014.
|
|
LI B X . Research on security situation assessment and prediction method of electric power information network[D]. Baoding:North China Electric Power University, 2014.
|
[12] |
HERVE C , FREDERIC G . Maturity assessment and process improvement for information security management in small and medium enterprises[J]. Journal of Software:Evolution and Process, 2014,26(5): 496-503.
|
[13] |
石江红 . 基于模糊测度理论的电力通信网风险评估[D]. 保定:华北电力大学, 2017.
|
|
SHI J H . Risk assessment of electric power communication network based on fuzzy measure theory[D]. Baoding:North China Electric Power University, 2017.
|
[14] |
崇小蕾, 庄子旻, 路超 ,等. 基于层次模糊综合评价法的信息安全评价[J]. 信息安全与通信保密, 2014(11): 137-139,143.
|
|
CHONG X L , ZHUANG Z M , LU C ,et al. Information security analysis based on AHP and fuzzy comprehensive evaluation[J]. Information Security and Communications Privacy, 2014(11): 137-139,143.
|
[15] |
王姣, 范科峰, 莫玮 . 基于模糊集和DS证据理论的信息安全风险评估方法[J]. 计算机应用研究, 2017,34(11): 3432-3436.
|
|
WANG J , FAN K F , MO W . Method for information security risk assessment based on fuzzy set theory and DS evidence theory[J]. Application Research of Computers, 2017,34(11): 3432-3436.
|
[16] |
苏琦, 王玮, 刘荫 ,等. 电力行业的信息安全防护方案研究[J]. 信息网络安全, 2017(11): 84-88.
|
|
SU Q , WANG W , LIU Y ,et al. Research on the scheme of information security protection in electric power industry[J]. Netinfo Security, 2017(11): 84-88.
|
[17] |
王静, 高昆仑, 张波 . 基于网络隔离与安全数据交换的发电集团双网体系研究与设计[J]. 电信科学, 2017,33(2): 163-172.
|
|
WANG J , GAO K L , ZHANG B . Research and design in dual network scheme of power corporation based on network isolation and secure data exchange[J]. Telecommunications Science, 2017,33(2): 163-172.
|
[18] |
梁智强, 林丹生 . 基于电力系统的信息安全风险评估机制研究[J]. 信息网络安全, 2017(4): 86-90.
|
|
LIANG Z Q , LIN D S . Information security risk assessment mechanism research based on power system[J]. Netinfo Security, 2017(4): 86-90.
|
[19] |
姜红红, 张涛, 赵新建 ,等. 基于大数据的电力信息网络流量异常检测机制[J]. 电信科学, 2017,33(3): 134-141.
|
|
JIANG H H , ZHANG T , ZHAO X J ,et al. A big data based flow anomaly detection mechanism of electric power information network[J]. Telecommunications Science, 2017,33(3): 134-141.
|
[20] |
王凯, 李婉卿, 白雨欣 . 基于模糊综合评判法的电力系统安全评估[J]. 数字技术与应用, 2019,37(1): 65-67.
|
|
WANG K , LI W Q , BAI Y X . Power system security assessment based on fuzzy comprehensive evaluation method[J]. Digital Technology and Application, 2019,37(1): 65-67.
|