[4] |
乌克兰电力系统遭受攻击事件综合分析报告[EB]. 2016.
|
|
Comprehensive analysis report of attacks on Ukraine's power system[EB]. 2016.
|
[5] |
COLAK I , SAGIROGLU S , FULLI G ,et al. A survey on the critical issues in smart grid technologies[J]. Renewable & Sustainable Energy Reviews, 2016(54): 396-405.
|
[6] |
顾卓远, 汤涌, 孙华东 ,等. 基于响应的电力系统安全稳定综合防御技术[J]. 中国电机工程学报, 2019(39): 1-10.
|
|
GU Z Y , TANG Y , SUN H D ,et al. Security and stability comprehensive defense technology of power system based on response[J]. China Electrical Engineering Journal, 2019(39): 1-10.
|
[7] |
MRABET Z E , KAABOUCH N , GHAZI H E ,et al. Cyber-security in smart grid:survey and challenges[J]. Computers& Electrical Engineering, 2018(67): 469-482.
|
[8] |
李田, 苏盛, 杨洪明 ,等. 电力信息物理系统的攻击行为与安全防护[J]. 电力系统自动化, 2017(22): 168-173.
|
|
LI T , SU S , YANG H M ,et al. Aggressive behavior and security protection of power information physics system[J]. Automation of Electric Power Systems, 2017(22): 168-173.
|
[9] |
胡贺军, 孙方楠, 王迎生 . 能源互联网信息安全架构研究[J]. 通讯世界, 2017(17): 31-32.
|
|
HU H J , SUN F N , WANG Y S . Research on information security architecture of energy internet[J]. Communications World, 2017(17): 31-32.
|
[10] |
JAGDEEP S , . Syscoin:a peer-to-peer electronic cash system with blockchain-based services for e-business[C]// Proceedings of International Conference on Computer Communication and Networks (ICCCN).[S.l.:s.n.] 2017(26): 1-6.
|
[11] |
卢星儒 . 网站安全评估技术与漏洞挖掘技术[J]. 计算机产品与流通, 2019(1): 44.
|
[1] |
张翼英 . 电力物联网安全技术研究[M]. 北京: 科学出版社, 2016.
|
|
ZHANG Y Y . Research on security technology of power Internet of things[M]. Beijing: Science Press, 2016.
|
[11] |
LU X R . Website security assessment technology and vulnerability mining technology[J]. Computer Products and Circulation, 2019(1): 44.
|
[12] |
付梦琳, 吴礼发, 洪征 ,等. 智能合约安全漏洞挖掘技术研究[J]. 计算机应用, 2019,9(7): 1959-1966.
|
[2] |
孟月, 田小梦 . 国家电网 2021 年将初步建成电力物联网[J]. 通信世界, 2019(8): 34-35.
|
|
MENG Y , TIAN X M . State grid will be initially built in the electric internet of things in 2021[J]. Communications World, 2019(8): 34-35.
|
[12] |
FU M L , WU L F , HONG Z ,et al. Research on the mining technology of smart contract security vulnerabilities[J]. Computer Applications, 2019,39(7): 1959-1966.
|
[13] |
王朱劳 . 入侵检测技术在网络安全中的应用分析[J]. 数字技术与应用, 2019,37(1): 209-210.
|
|
WANG Z L . Application analysis of intrusion detection technology in network security[J]. Digital Technology and Application, 2019,37(1): 209-210.
|
[14] |
谭慧婷, 唐朝京 . 移动目标防御中动态网络技术现状、性能和发展方向探讨[J]. 网络安全技术与应用, 2017(6): 22-23.
|
[3] |
何英 . 能源互联网背景下网络安全重要性凸显[N]. 中国能源报, 2017-01-02.
|
|
HE Y . The importance of network security in the context of energy Internet[N]. China Energy Journal, 2017-01-02.
|
[14] |
TAN H T , TANG C J . Discussion on the status quo,performance and development direction of dynamic network technology in mobile target defense[J]. Network Security Technology& Application, 2017(6): 22-23.
|
[15] |
罗兴国, 仝青, 张铮 . 拟态防御技术[J]. 中国工程科学, 2016,18(6): 69-73.
|
|
LUO X G , TONG Q , ZHANG Z . Mimetic defense technology[J]. China Engineering Science, 2016,18(6): 69-73.
|
[16] |
王明明, 岳文雷, 杨振乾 . 网络安全中的防火墙技术应用分析[J]. 网络安全技术与应用, 2019(3): 21,23.
|
|
WANG M M , YUE W L , YANG Z Q . Application analysis of firewall technology in network security[J]. Network Security Technology and Application, 2019(3): 21,23.
|
[17] |
王诗琦 . 网络安全隔离与信息交换技术的系统分析[J]. 信息通信, 2012(3): 211-212.
|
|
WANG S Q . System analysis of network security isolation and information exchange technology[J]. Information & Communications, 2012(3): 211-212
|
[18] |
周长春, 田晓丽, 张宁 ,等. 云计算中身份认证技术研究[J]. 计算机科学, 2016,43(S1): 339-341,369.
|
|
ZHOU C C , TIAN X L , ZHANG N ,et al. Research on Identity Authentication Technology in Cloud Computing[J]. Computer Science, 2016,43(S1): 339-341,369.
|
[19] |
杨鑫 . 网络安全技术中VPN技术的应用[J]. 电子技术与软件工程, 2019(3): 208.
|
|
YANG X . Application of VPN technology in network security technology[J]. Electronic Technology and Software Engineering, 2019(3): 208.
|
[20] |
王磊, 赵广怀, 范晓楠 ,等. 量子保密通信在电网业务应用的方案研究与设计[J]. 电力信息与通信技术, 2018,16(3): 34-38.
|
|
WANG L , ZHAO G H , FAN X N ,et al. Research and design on the application of quantum secure communication in power grid business[J]. Electric Power Information and Communication Technology, 2018,16(3): 34-38.
|
[21] |
周德旺, 皇安伟 . 量子通信助力信息安全保密[J]. 保密工作, 2018(8): 6-8.
|
|
ZHOU D W , HUANG A W . Quantum communi- cation power information security and confiden- tiality[J]. Security Work, 2018(8): 6-8.
|
[22] |
李文华, 袁夕征, 熊晓然 . 量子保密通信关键技术及组网应用探讨[J]. 邮电设计技术, 2019(2): 69-75.
|
|
LI W H , YUAN X Z , XIONG X R . Key technology and network application of quantum secure communication[J]. Posts and Telecommunications Design Technology, 2019(2): 69-75.
|
[23] |
肖洁, 袁嵩, 谭天 . 大数据时代数据隐私安全研究[J]. 计算机技术与发展, 2016,26(5): 91-94.
|
|
XIAO J , YUAN S , TAN T . Research on Data Privacy Security in the Big Data Era[J]. Computer Technology and Development, 2016,26(5): 91-94.
|
[24] |
左晓军, 丁斌, 陈泽 . 透明加解密技术在企业数据保护中的研究与应用[J]. 河北电力技术, 2018,37(3): 26-28,54.
|
|
ZUO X J , DING B , CHEN Z . Research and application of transparent encryption and decryption technology in enterprise data protection[J]. Hebei Electric Power Technology, 2018,37(3): 26-28,54.
|
[25] |
王凌 . 计算机病毒的感染原理及防范技术研究[J]. 中国管理信息化, 2013,16(1): 79-80.
|
|
WANG L . Research on computer virus infection principle and prevention technology[J]. China Management Information Technology, 2013,16(1): 79-80.
|
[26] |
丁伟, 王国成, 许爱东 ,等. 能源区块链的关键技术及信息安全问题研究[J]. 中国电机工程学报, 2018,38(4): 1026-1034,1279.
|
|
DING W , WANG G C , XU A D ,et al. Research on key technologies and information security of energy blockchain[J]. Chinese Journal of Electrical Engineering, 2018,38(4): 1026-1034,1279.
|
[27] |
郭鹤旋, 鲁斌 . 基于交叉区块链的能源互联网信息物理安全防御框架[J]. 电脑知识与技术, 2018,14(23): 7-9.
|
|
GUO H X , LU B . Energy Internet information physical security defense framework based on cross blockchain[J]. Computer Knowledge and Technology, 2018,14(23): 7-9.
|
[28] |
栾文鹏, 刘永磊, 王鹏 ,等. 基于可信平台模块的能源互联网新型统一安全架构[J]. 吉林大学学报(工学版), 2017,47(6): 1933-1938.
|
|
LUAN W P , LIU Y L , WANG P ,et al. New unified security architecture for energy internet based on trusted platform module[J]. Journal of Jilin University (Engineering and Technology Edition), 2017,47(6): 1933-1938.
|