[1]
|
Cleveland, F. (2006) IEC TC57 Security Standards for the power system’s Information Infrastructure—Beyond Simple Encryption. IEEE PES TD 2005/2006, 21-24 May 2006, 1079-1087.
|
[2]
|
Lin, C., Wang, Y. and Li, Q.L. (2005) Stochastic Modeling and Evaluation for Network Security. Chinese Journal of Computers, 28, 1943-1956.
|
[3]
|
Niu, P.C., Kang, J.T., Li, A.W. and Li, L. (2010) New Operation Form of Power Network Started by Smart Grid. Power System Protection and Control, 38, 240-244.
|
[4]
|
Li, W.W., You, W.X. and Wang, X.P. (2011) Survey of Cyber Security Research in Power System. Power System Protection and Control, 39, 140-147.
|
[5]
|
Watts, D. (2003) Security & Vulnerability in Electric Power Systems. IEEE 35th North American Power Symposium Conference, Rolla Missouri USA, 20-21-19 October 2003, 559-566.
|
[6]
|
Lewis, J.A. (2011) The Electrical Grid as a Target for Cyber Attack.
http://csis.org/files/publication/100322_ElectricalGridAsATargetforCyberAttack.pdf
|
[7]
|
Kelic, A., Warren, D.E. and Philips, L.R. (2011) Cyber and Physical Infrastructure Interdependence.
http://prod.sandia.gov/techlib/access-control.cgi/2008/086192.pdf
|
[8]
|
Anderson, R.S. (2011) Cyber Security and Resilient Systems.
http://www.inl.gov/technicalpublications/Documents/4311316.pdf
|
[9]
|
Department of Homeland Security Office of Cyber Security and Communications National Cyber Security Division (2011) National Cyber Exercise: Cyber Storm. http://cryptome.org/cyberstorm.pdf
|
[10]
|
China News Network (2011) Iranian Officials Have Accused the USA and Israel Manufacture of Computer Viruses Destroy Iranian Nuclear Facilities. http://www.chinanews.com/gj/2011/04-17/2977981.shtml
|
[11]
|
Headquarters Department of the Army Washington, DC (2011) Infrastructure Risk Management (Army).
http://www.apd.army.mil/pdffiles/r525_26.pdf
|
[12]
|
State Electricity Regulatory Commission (2004) Power Monitoring System Security Requirements. Beijing.
|
[13]
|
Rinaldi, S.M., Peerenboom, J.P. and Kelly, T.K. (2001) Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems, 21, 11-25. http://dx.doi.org/10.1109/37.969131
|
[14]
|
Liu, J.F., Chen, C.P. and Luo, J. (2004) Design and Application of Information’s Security and Protection in Power Supervision and Control Automatic System. Relay, 32, 33-35.
|
[15]
|
Wu, G.W. (2007) Information Disposal and Network Security Analysis in Digital Substation. Relay, 35, 18-22.
|
[16]
|
Du, G.H. and Wang, Z.F. (2010) Design and Research on Power Network Dispatching Integration of Smart Grid. Power System Protection and Control, 38, 127-131.
|
[17]
|
Stamp, J. and Mcintyre, A. (2009) Reliability Impacts from Cyber Attack on Electric Power Systems. The 2009 Power Systems Conference and Exposition, Seattle, 15-18 March 2009, 1-8.
|
[18]
|
Tatum, M. (2011) What Is a Cyber attack? http://www.wisegeek.com/what-is-a-cyberattack.htm
|
[19]
|
Subs-tations Committee of the IEEE Power Engineering Society (2008) IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE Std 1402-2000(R2008). USA.
|
[20]
|
IEC TS 62351-1 (2007) Power Systems Management and Associated Information Exchange—Data and Communications Security Part I: Communication Network and System Security—Introduction to Security Issues. Geneva.
|
[21]
|
Li, J. (2011) Academician Disclose the Cyber Attack Is Very Serious in China.
http://society.people.com.cn/GB/1062/9343749.html
|
[22]
|
Mu, L.H., Zhu, G.F. and Zhu, J.R. (2010) Design of Intel-ligent Terminal Based on Smart Grid. Power System Protection and Control, 38, 53-56.
|
[23]
|
Han, Y.J., Zhao, N.Q. and Liu, Y.C. (2005) Destructive Mechanism of Blackout Bomb and Its Defending Measures Ordnance Material Science and Engineering, 28, 57-60.
|
[24]
|
Zhang, Y.Q. (2011) Network Attack and Defense Technology. Tsinghua University Press, Beijing, 59-65.
|
[25]
|
Baigent, D., Adamiak, M. and Mackiewicz, R. (2011) IEC61850 Communication Networks and Systems in Substations: An Overview for Users. http://www.sisconet.com
|
[26]
|
Negrete-Pincetic, M., Yoshida, F. and Gross, G. (2009) Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment. Bucharest Power Tech Conference, Romania, 28 June-2 July 2009, 105- 111.
|
[27]
|
Liu, N., Zhang, J.H. and Duan, B. (2009) Design of Security Mechanism for Substation Remote Configuration Based on XML Security. Electric Power Automation Equipment, 29, 113-117.
|
[28]
|
Taylor, C., Krings, A. and Foss, J.A. (2011) Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.80.8323&rep=rep1&type=pdf
|
[29]
|
Hu, Y., Xie, X.R., Han, Y.D., et al. (2005) A Survey to Design Method of Security Architecture for Power Information Systems. Power System Technology, 29, 35-39.
|
[30]
|
Greenberg, A. (2011) Congress Alarmed at Cyber-Vulnerability of Power Grid.
http://www.forbes.com/2008/05/22/cyberwar-breach-government- tech-security_cx_ag_0521cyber.html
|
[31]
|
Meserve, J. (2011) Staged Cyber Attack Reveals Vulnerability in Power Grid.
http://articles.cnn.com/2007-09-26/us/power.at.risk_1_generator-cyber-attack-electric-infrastructure?_s=PM:US
|
[32]
|
Poulsen, K. (2011) Report: Cyber Attacks Caused Power Outages in Brazil.
http://www.wired.com/threatlevel/2009/11/brazil/
|
[33]
|
Oman, P., Schweitzer, E. and Roberts, J. (2011) Protecting the Grid from Cyber Attack Part I: Recognizing Our Vulnerabilities. http://www.elp.com/index/display/article-display/130136/articles/utility-automation-engineering-td/volume-6/issue-7/features/protecting-the-grid-from-cyber-attack-part-i-recognizing-our-vulnerabilities.html
|
[34]
|
Wikipedia (2011) Stuxnet. http://en.wikipedia.org/wiki/Stuxnet
|