共 14 条
[1]
NISTIR 7628, Guidelines for Smart Grid Cyber Security, 1-3
[2]
Bjorkman G., The viking project-towards more secure scada systems, Proc. HSCC 1st Workshop Secure Control Systems, (2010)
[3]
Schneier B., Attack trees: Modeling security threats, Dr. Dobb's J., (1999)
[4]
Sommestad T., Ekstedt M., Johnson P., A probabilistic relational model for security risk analysis, Computers & Security, 29, 6, pp. 659-679, (2010)
[5]
Sommestad T., Holm H., Ekstedt M., Effort estimates for vulnerability discovery projects, Proc. 45th Hawaii Int'l Conf. System Sciences, pp. 5564-5573, (2012)
[6]
Tsang P., Smith S., Yasir: A low-latency, high-integrity security retrofit for legacy scada systems, Proc. IFIP/TC11 Int'l Information Security Conference, pp. 445-459, (2008)
[7]
Abur A., Exposito A., Power System State Estimation: Theory and Implementation, (2004)
[8]
Liu Y., Ning P., Reiter M., False data injection attacks against state estimation in electric power grids, Proc. ACM Conf. Computer and Communications Security (CCS 09), (2009)
[9]
Dan G., Sandberg H., Stealth attacks and protection schemes for state estimators in power systems, Proc. IEEE SmartGridComm, (2010)
[10]
Vukovic O., Et al., Network-layer protection schemes against stealth attacks on state estimators in power systems, Proc. IEEE SmartGridComm, pp. 184-189, (2011)