Computer Science ›› 2013, Vol. 40 ›› Issue (11): 81-84.
Previous Articles Next Articles
MA Jun and ZHANG Yi-bin
[1] IEC TS 62351-1,IEC Technical Committee 57,Data and Communications Security,Part1:Communication Network and System Security-Introduction to Security Issues[S].2007 [2] IEC TS 62351-5,IEC Technical Committee 57,Data and Communications Security,Part5:Security for IEC 60870-5and derivatives[S].2009 [3] Ma Jun,She Jun.Research on Cyber Security Segre-gation for Industrial Control Systems[J].International Journal of Digital Content Technology and its Applications,2011,5(8):9-15 [4] Igure V M,Laughter S A,Williams R D.Security issues in SCADA networks [J].Computers and Security,2006,25(7):498-506 [5] III B C L,Buennemeyer T K ,Thomas R W.Next generation SCADA security:best practices and client puzzles[C]∥Proc.6th Annual.IEEE System,Information Assurance Workshop.2005:426-427 [6] Lim I H,Hong S,Lee S J,et al.Security Protocols Against cyber attacks in the distribution automation system[J].IEEE Transactions on Power Delivery,2010,25(1):448-454 [7] 黄梦婕,胥布工.基于HMAC算法的远程电力监控通信安全策略[J].电力系统保护与控制,2011,39(19):79-82 [8] Kim M,Metzner J J.A key exchange method for intelligent electronic devices in distribution automation[J].IEEE Transactions on Power Delivery,2010,25(3):1458-1463 [9] 孙中伟,张荣刚.智能配电网通信系统访问控制研究[J].电力系统保护与控制,2010,38(21):118-121 [10] Sun Zhong-wei,Wu Ju-ying.Identity-based access con-trol for distribution automation using EPON[J].Chinese Journal of Electronics,2011,0(3):443-446 [11] Hirschler B,Treytl A.Internet Protocol Security and PowerLine Communication[C]∥2012IEEE International Symposium on Power Line Communication and its Applications.2012:102-107 [12] Yan Ye,Hu R Q,Das S K,et al.An Efficient Security Protocol for Advanced Metering Infrastructure in Smart Grid [J].IEEE Network,2013,7(4):64-71 |
No related articles found! |
|