[1] |
RIFKIN J . The third industrial revolution:how lateral power is transforming energy,the economy and the world[M]. Berlin: Macmillan, 2011: 27-68.
|
[2] |
田世明, 栾文鹏, 张东霞 , 等. 能源互联网技术形态与关键技术[J]. 中国电机工程学报, 2015,35(14):3482-3494. TIAN S M , LUAN W P , ZHANG D X , et al. Technical forms and key technologies on energy internet[J]. Proceedings of the CSEE, 2015,35(14):3482-3494.
|
[3] |
刘振亚 . 全球能源互联网[M]. 北京: 中国电力出版社 2015. LIU Z Y . Global energy interconnection[M]. Beijing: China Electric Power Press 2015.
|
[4] |
杨新法, 苏剑, 吕志鹏 , 等. 微电网技术综述[J]. 中国电机工程学报, 2014,34(1):57-70. YANG X F , SU J , LV Z P , et al. Overview on micro-grid technology[J]. Proceedings of the CSEE, 2014,34(1):57-70.
|
[5] |
赵海, 蔡巍, 王进法 , 等. 能源互联网架构设计与拓扑模型[J]. 电工技术学报, 2015,30(11). ZHAO H , CAI W , WANG J F , et al. An architecture design and topological model of inter grid[J]. Transactions of China Electrotechnical Society, 2015,30(11).
|
[6] |
ZHOU J , HU R Q , QIAN Y , et al. Scalable distributed communication architectures to support advanced metering infrastructure in smart grid[J]. IEEE Transactions on Parallel and Distributed Systems, 2012: 23(9):1632-1642.
|
[7] |
WANG A , ROGERS J . Peer to peer electricity:beyond the smart grid[M]. [S.l.]:AXL Incorporated, 2012.
|
[8] |
CAI F , FARANTATOS E , HUANG R , et al. Self-powered smart meter with synchronized data[C]// 2012 IEEE Radio and Wireless Symposium(RWS), January15-18, 2012, Santa Clara,CA, USA. New Jersy: IEEE Press, 2012:395-398.
|
[9] |
YUE X , QIU X , JI Y , et al. P2P attack taxonomy and relationship analysis[C]// The 11th International Conference on ICACT, February15-18, 2009, Phoenix Park,Korea. New Jersy: IEEE Press, 2009:1207-1210.
|
[10] |
张春红, 裘晓峰, 弭伟 , 等. P2P技术全面解析[M]. 北京: 人民邮电出版社, 2010. ZHANG C H , QIU X F , MI W , et al. Comprehensive analysis of P2P technology[M]. Beijing: Posts and Telecom Press, 2010.
|
[11] |
]Khan:vulnerabilities of P2P systems and a critical look at their solutions[EB/OL].[ 2006-11-01]. .
|
[12] |
LIANG J , KUMAR R , XI Y , et al. Pollution in P2P file sharing systems[C]// 24th Annual Joint Conference of the IEEE Computer and Communications Societies, March13-17, 2005, Miami,Florida,USA. New Jersy: IEEE Press, 2005:1174-1185.
|
[13] |
DINGER J , HARTENSTEIN H . Defending the sybil attack in P2P networks:taxonomy,challenges,and a proposal for self-registration[C]// The 1st International Conference on Availability,Reliability and Security, April20-22, 2006, Vienna,Austria. New Jersy: IEEE Press, 2006.
|
[14] |
CERRI D , GHIONO A , PARABOSCHI S , et al. ID mapping attacks in P2P networks[C]// IEEE Global Telecommunications Conference, November28-December2, 2005, Saint Louis,USA. New Jersy: IEEE Press, 2005.
|
[15] |
STUTZBACH D , REJAIE R . Understanding churn in peer-to-peer networks[C]// The 6th ACM SIGCOMM Conference on Internet Measurement, October25-27, 2006, Rio De Janeiro,Brazil. New York: ACM Press, 2006:189-202.
|
[16] |
GANESH L , ZHAO B Y . Identity theft protection in structured overlays[C]// The 1st IEEE ICNP Workshop on Secure Network Protocols, November6, 2005, Boston,Massachusetts,USA. New Jersy: IEEE Press, 2005:49-54.
|
[17] |
LI J , QIU X , JI Y , et al. Researches on secure proximity distance defending attack of finger table based on chord[C]// The 11th International Conference on Advanced Communication Technology, February15-18, 2009, Phoenix Park,Korea. New Jersy: IEEE Press, 2009:1923-1927.
|