[1] | 辛耀中.新世纪电网调度自动化技术发展趋势[J].电网技术,2001,25(12):1-10.
|
[2] | Xin Yaozhong.Development trend of power system dispatching automation in 21st century[J].Power System Technology,2001,25(12):1-10.
|
[3] | 胡炎,董名垂,韩英铎.电力工业信息安全的思考[J].电力系统自动化,2002,26(7):1-4.
|
[4] | Hu Yan,Dong Mingchui,Han Yingduo.Consideration of information security for electric power industry[J].Automation of Electric Power Systems,2002,26(7):1-4.
|
[5] | 胡炎,谢小荣,韩英铎,等.电力信息系统安全体系设计方法综述[J].电网技术,2005,29(1):35-39.
|
[6] | Hu Yan,Xie Xiaorong,Han Yingduo,et al.A survey to design method of security architecture for power information systems[J].Power System Technology,2005,29(1):35-39.
|
[7] | 周士跃,王劲松,金小达.地区供电网调度实时数据网络安全分析及对策[J].电网技术,2003,27(10):52-55.
|
[8] | Zhou Shiyue,Wang Jinsong,Jin Xiaoda.Security analysis and countermeasures of real-time dispatching data network for regional power supply network [J].Power System Technology,2003,27(10):52-55.
|
[9] | 陈思勤.华能上海石洞口第二电厂实时系统安全分析及防护对策[J].电网技术,2004,28(11):72-75.
|
[10] | Chen Siqin.Security analysis of real-time systems in Huaneng Shanghai Shidongkou No.2 power plant and their protection measures[J].Power System Technology,2004,28(11):72-75.
|
[11] | 周亮,刘开培,李俊娥.一种安全的电力系统计算机网络构建方案[J].电网技术,2004,28(23):71-75.
|
[12] | Zhou Liang,Liu Kaipei,Li Jun’e.A comprehensive project to construct secure computer network for power system[J].Power System Technology,2004,28(23):71-75.
|
[13] | 韩祯祥,曹一家.电力系统的安全性及防治措施[J].电网技术,2004,28(9):1-6.
|
[14] | Han Zhenxiang,Cao Yijia.Power system security and its prevention[J].Power System Technology,2004,28(9):1-6.
|
[15] | Erich Gamma,Richard Helm,Ralph Johnson等著.李英军,马晓星,蔡敏等译.设计模式——可复用面向对象软件的基础[M].北京:机械工业出版社,2000.
|
[16] | The Open Group.Guide to security patterns[EB/OL].http://www.
|
[17] | opengroup.org/security/sdpd1.zip.
|
[18] | 胡炎,谢小荣,辛耀中.电力信息系统安全:建模和定量评估[C].2004全国电力系统自动化学术交流研讨大会论文集,桂林,2004,10:453-462.
|
[19] | 美国国家安全局著.国家973信息与网络安全体系研究课题组译.信息保障技术框架(IATF)3.0[M].北京:北京中软电子出版社,2002.
|
[20] | 胡炎,辛耀中,韩英铎.二次系统安全体系结构化设计方法[J].电力系统自动化,2003,27(21):63-67.
|
[21] | Hu Yan,Xin Yaozhong,Han Yingduo.A method for the structured security architecture design of secondary systems[J].Automation of Electric Power Systems,2003,27(21):63-67.
|
[22] | McClure,Secmbray,Kurtz著.杨继张译.黑客大曝光——网络安全机密与解决方案[M].北京:清华大学出版社,2000.
|
[23] | Kropp T.Security enhancements for utility information architectures
|
[24] | [R] .USA:EPRI,2002.
|
[25] | Kaustubh M. Phaltankar著.杨义先,夏光升,李忠献译.内联网与外联网安全指南[M].北京:人民邮电出版社,2001.
|
[26] | Gerber M,Solms R von.From risk analysis to security requirements[J].Computers & Security,2001,(20):577-584.
|
[27] | 姚小兰.网络安全管理与技术防护[M].北京:北京理工大学出版社,2002.
|
[28] | Bodeau D J.A conceptual model for computer security risk analysis [C].Computer Security Applications Conference,San Antonio,TX,USA,8:56-63.
|
[29] | NIST SP 800-30,Risk management guide for information technology systems[S].
|
[30] | Herrmann P,Krumm H.Object-oriented security analysis and modeling [C].Proceedings of 9th International Conference on Telecommunication Systems—Modeling and Analysis,Dallas,ATSMA,IFIP,2001,9:21-32.
|
[31] | ISO/IEC TR 13335-4,Information technology—guidelines for the management of IT security—part 4: selection of safeguards[S].
|