[1] | 迟永宁,刘燕华,王伟胜,等.风电接入对电力系统的影响[J].电网技术,2007,31(3):77-81.
|
[2] | 包士魁,宁玉琴,贾志刚.网络安全防御体系的构建及功能配置[J].科技咨询导报,2007(12):6.
|
[3] | Bao Shikui,Ning Yuqin,Jia Zhigang.The construction and functions configuration of the network security defense system[J].Science and Technology Consulting Herald,2007(12):6(in Chinese).
|
[4] | Denning D E.An intrusion-detection model[J].IEEE Transaction on Software Engineering,1987,13(2):222-232.
|
[5] | 王先培,熊平,李文武.防火墙和入侵检测系统在电力企业信息网络中的应用[J].电力系统自动化,2002,26(5):60-63.
|
[6] | Wang Xianpei,Xiong Ping,Li Wenwu.Application of firewall and IDS in the information network for power enterprises[J].Automation of Electric Power Systems,2002,26(5):60-63(in Chinese).
|
[7] | 季称利,杨晓元,胡予濮,等.五层安全模型的概念及应用[J].计算机工程,2005,31(15):132-134.
|
[8] | Ji Chenli,Yang Xiaoyuan,Hu Yupu,et al.Concepts and application of five-layers security model[J].Computer Engineering,2005,31(15):132-134(in Chinese).
|
[9] | 钱伟中,王蔚然,袁宏春.分布式防火墙环境的边界防御系统[J].电子科技大学学报,2005,34(4):513-516.
|
[10] | Qian Weizhong,Wang Weiran,Yuan Hongchun.Boundary defense system based on DFW[J].Journal of UEST of China,2005,34(4):513-516(in Chinese).
|
[11] | 姚立红,谢立.IPSEC与防火墙协同工作设计与实现[J].小型微型计算机系统,2004,25(12):183-186.
|
[12] | Yao Lihong,Xie Li.Research and implementation of cooperation of IPSEC and firewall[J].Mini-Micro Systems,2004,25(12):183-186(in Chinese).
|
[13] | 王伟,曹元大,阎慧.分布式防火墙下的分布式通信技术[J].计算机工程,2003,29(22):148-150.
|
[14] | Wang Wei,Cao Yuanda,Yan Hui.Distributed object technologies in distributed firewall[J].Computer Engineering,2003,29(22):148-150(in Chinese).
|
[15] | CHI Yongning,LIU Yanhua,WANG Weisheng,et al.Study on impact of wind power integration on power system[J].Power System Technology,2007,31(3):77-81(in Chinese).
|
[16] | Hassan G.Development of a generic wind farm SCADA system [EB/OL].2001.http://www.garradhassan.com.
|
[17] | Hassan G.GH wind farm supervisory control and data acquisition system user’s manual[EB/OL].2006.http://www.garradhassan.Com.
|
[18] | Wolthusen S.Layered multipoint network defense and security policy enforcement[C].The Second Annual IEEE SMC Information Assurance Workshop,West Point,NY,USA,200l.
|
[19] | 戚宇林,刘文颖,杨以涵,等.电力信息的网络化传输是电力系统安全的重要保证[J].电网技术,2004,28(9):58-61.
|
[20] | Qi Yulin,Liu Wenying,Yang Yihan,et al.Ensuring power system security by networking transmission of electric power information [J].Power System Technology,2004,28(9):58-61(in Chinese).
|
[21] | 周士跃,王劲松,金小达.地区供电网调度实时数据网络安全分析及对策[J].电网技术,2003,27(10):52-55.
|
[22] | Zhou Shiyue,Wang Jinsong,Jin Xiaoda.Security analysis and countermeasures of real-time dispatching data network for regional power supply network[J].Power System Technology,2003,27(10):52-55(in Chinese).
|
[23] | 吴国威.数字化变电站中信息处理及网络信息安全分析[J].继电器,2007,35(12):18-22.
|
[24] | Wu Guowei.Information disposal and network security analysis in digital substation[J].Relay,2007,35(12):18-22(in Chinese).
|
[25] | Willian Stallings.Cryptography and network security:principles and practice[M].Second Edition.Beijing:Publishing House of Electronics Industry,2001:621-634.
|
[26] | Young W F,Stamp J E,Dillinger J D.Communication vulnerabilities and mitigations in Wind Power SCADA systems[C].American Wind Energy Association Windpower 2003 Conference,Austin,Texas,USA,2003.
|
[27] | 陈军,王海洋,曹鲁慧.基于SOAP的分布式防火墙策略发布研究[J].计算机科学,2005,32(5):82-84.
|
[28] | Chen Jun,Wang Haiyang,Gao Luhui.Research in policy issue of distributed firewalls based SOAP[J].Computer Science,2005,32(5):82-84(in Chinese).
|
[29] | 郑明磊,李建华,张少俊.基于SOAP的开放性网络安全管理[J].计算机工程,2003,29(2):83-87.
|
[30] | Zheng Minglei,Li Jianhua,Zhang Shaojun.SOAP-based open network security management[J].Computer Engineering,2003,29(2):83-87(in Chinese).
|
[31] | 张功萱,宋斌,王平立.基于SOAP的网络消息安全策略[J].南京理工大学学报,2007,31(1):66-70.
|
[32] | Zhang Gongxuan,Song Bin,Wang Pingli.Security policy of network messages based on SOAP[J].Journal of Nanjing University of Science and Technology,2007,31(1):66-70(in Chinese).
|
[33] | 雷亚洲,Gordon L.国外风力发电导则及动态模型简介[J].电网技术,2005,25 (12):27-32.
|
[34] | Lei Yazhou,Gordon L.An introduction on wind power grid code and dynamic simulation[J].Power System Technology,2005,25(12):27-32(in Chinese).
|