Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 455-459.
• Information Security • Previous Articles Next Articles
CAO Kang-hua, DONG Wei-wei, WANG Jin-liang, ZHOU Lin, WANG Yong
CLC Number:
[1]赵兵,翟峰,李涛永,等.适用于智能电表双向互动系统的安全通信协议[J].电力系统自动化,2016,40(17):93-98. [2]李敏,王刚,石磊,等.智能电网信息安全风险分析[J].华北电力技术,2017(1):62-65. [3]李中伟,佟为明,金显吉.智能电网信息安全防御体系与信息安全测试系统构建乌克兰和以色列国家电网遭受网络攻击事件的思考与启示[J].电力系统自动化,2016,40(8):147-151. [4]任天成.电力信息网络主动式风险预警系统开发研究[D].北京:华北电力大学,2015. [5]FAISAL M A,AUNG Z,WILLIAMS J R,et al.Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid:A feasibility study[J].IEEESystems Journal,2015,9(1):31-44. [6]WANG K,OUYANG Z,KRISHNAN R,et al.A game theory-based energy management system using price elasticity for smart grids[J].IEEE Transactions on Industrial Informatics,2015,11(6):1607-1616. [7]YE F,QIAN Y,HU R Q.A security protocol for advanced metering infrastructure in smart grid[C]∥2014 IEEE Global Communications Conference.Austin,TX,USA:IEEE,2014:649-654. [8]LIU N,ZHU C L,ZHANG J,et al.A key management scheme for secure communications of advanced metering infrastructure in smart grid[J].IEEE Transactions on Instrumentationand Measurement,2013,60(10):4746-4756. [9]张恩超.智能电网信息安全防御体系架构与关键技术研究[D].北京:华北电力大学,2016. [10]周晟,赵君翊,葛元鹏.主被动防御结合的智能电网信息安全防护体系[J].电子科技,2015,28(6):213-215. [11]陈飞.智能电网信息安全交互模型及关键技术研究[D].北京华北电力大学,2014. [12]诸葛建伟,唐勇,韩心慧,等.蜜罐技术研究与应用进展[J].软件学报,2013,24(4):825-842. [13]CONPOT ICS/SCADA honeypot[EB/OL].https://www.conpot.org. [14]KOLTYS K,GAJEWSKI R.Shape:A honeypot for electric power substation[J].Journal of Telecommunications and Information Technology,2015(4):37-43. [15]FAN W,FERNÁNDEZ D,DU Z.Versatile virtual honeynetmanagement framework[J].IET Information Security,2017,11(1):38-45. [16]REN J,XU Y.A compartmental model to explore the interplay between virus epidemics and honeynet potency[J].Applied Mathematical Modelling,2018,59:86-99. [17]SOKOL P,GAJDO A.Prediction of Attacks Against Honeynet Based on Time Series Modeling[J].Applied Computational Intelligence and Mathematical Methods,2018,662:360-371. [18]易秀双,马世伟,王卫东.虚拟蜜网核心功能剖析与实例部署[J].计算机科学,2012,39(3):101-103,109. [19]胡江溢,祝恩国,杜新纲,等.用电信息采集系统应用现状及发展趋势[J].电力系统自动化,2014,38(2):131-135. [20]祝恩国,刘宣,葛磊蛟.用电信息采集系统非结构化数据管理设计[J].电力系统及其自动化学报,2016,28(10):123-128. [21]翟峰,冯云,李保丰.电力采集系统安全防护和密码管理体系[J].网络空间安全,2018,9(2):79-84,89. |
[1] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[2] | MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596. |
[3] | CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18. |
[4] | DAI Hong-bin. Research on the Independence of the Communication Protocol Software in Automation [J]. Computer Science, 2013, 40(Z11): 68-72. |
[5] | CAO Li-feng,LI Zhong,CHEN Xing-yuan and FENG Yu. Method of Binding Secure Label to Data Object Based on XML [J]. Computer Science, 2013, 40(8): 124-128. |
[6] | . Research on Communication Protocol Fault-oriented Reliability Testing of Distributed Software [J]. Computer Science, 2012, 39(7): 132-134. |
[7] | . Overview of Wireless Sensor and Actor Networks [J]. Computer Science, 2012, 39(10): 21-25. |
[8] | LI Xiao-yan,MIAO Chang-yun. A Kind of Network Security Protocols and Verification [J]. Computer Science, 2011, 38(Z10): 87-88. |
[9] | . [J]. Computer Science, 2007, 34(1): 39-41. |
[10] | XIA Nai, LIN Zhi-Qiang,MAO Bing, XIE Li (National Laboratory for Novel Software Technology, Nanjing University,Nanjing 210093). [J]. Computer Science, 2006, 33(12): 1-5. |
|