共 16 条
[1]
[2]
[3]
[4]
[5]
Wind farm security: attack surface; targets; scenarios and mitigation[J] Jason Staggs;David Ferlemann;Sujeet Shenoi International Journal of Critical Infrastructure Protection 2017,
[6]
A review of cyber security risk assessment methods for SCADA systems[J] Yulia Cherdantseva;Pete Burnap;Andrew Blyth;Peter Eden;Kevin Jones;Hugh Soulsby;Kristan Stoddart Computers & Security 2016,
[7]
Abnormal traffic-indexed state estimation: A cyber–physical fusion approach for Smart Grid attack detection[J] Ting Liu;Yanan Sun;Yang Liu;Yuhong Gui;Yucheng Zhao;Dai Wang;Chao Shen Future Generation Computer Systems 2015,
[8]
A secure control framework for resource-limited adversaries[J] André Teixeira;Iman Shames;Henrik Sandberg;Karl Henrik Johansson Automatica 2015,
[9]
GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques[J] Jafarnia Jahromi Ali;Broumandan Ali;Nielsen John;Lachapelle Gérard International Journal of Navigation and Observation 2012,
[10]
False data injection attacks against state estimation in electric power grids[J] Yao Liu;Peng Ning;Michael K. Reiter ACM Transactions on Information and System Security (TISSEC) 2011,

