[1] Tuballa M L, Abundo M L.A review of the development of Smart Grid technologies[J]. Renewable & Sustainable Energy Reviews (S1364-0321), 2016, 59: 710-725. [2] Xiang Y, Ding Z, Zhang Y, et al.Power System Reliability Evaluation Considering Load Redistribution Attacks[J]. IEEE Transactions on Smart Grid (S1949-3053), 2016 (99): 1. [3] Wei D, Darie F, Shen L.Application layer security proxy for smart Grid substation automation systems[C]// Innovative Smart Grid Technologies. USA: IEEE, 2013: 1-6. [4] Peng H, Luo K Y, Tang Z N, et al.Research on power system security defense system in Smart Grid[C]// National Symposium on Conservation and Control, 2011. Nanjing: Chinese society of Electrical Engineering, 2012: 212-218. [5] Bai D.Smart grid state estimation and performance analysis [D]. Chengdu, China: University of Electronic Science and Technology of China, 2015. [6] Chen C M, Hsiao H W, Yang P Y, et al.Defending malicious attacks in cyber physical systems[C]// IEEE, International Conference on Cyber-Physical Systems, Networks, and Applications. USA: IEEE, 2013: 13-18. [7] Pasqualetti F, Dorfler F, Bullo F.Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems[J]. Control Systems IEEE (S1066-033), 2015, 35(1): 110-127. [8] Pasqualetti F, Dörfler F, Bullo F.Attack Detection and Identification in Cyber-Physical Systems[J]. IEEE Transactions on Automatic Control (S0018-9286), 2013, 58(11): 2715-2729. [9] Liang J, Sankar L, Kosut O.Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation[J]. IEEE Transactions on Power Systems (S0885-8950), 2015, 31(5): 3864-3872. [10] Fan L.Analysis of Power System Vulnerability Under Cyber Attack Threat [D]. Beijing: North China Electric Power University, 2015. [11] Luan H, Lu G.How do the power grid enterprise prevent the cyber attack[J]. China Energy (S1003-2355), 2016 (6): 94-96. [12] Li Z W, Tong W M, Jin X J.Construction of Cyber Security Defense Hierarchy and Cyber Security Testing System of Smart Grid: Thinking and Enlightenment for Network Attack Events to National Power Grid of Ukraine and Israel[J]. Automation of Electric Power Systems (S1000-1026), 2016, 40(8): 147-151. [13] Wang W, Zhang D.Analysis of Power System Security and Stability Issues under Electric Market Based on American Large-scale Blackouts[J]. Guizhou Electric Power Technology (S1008-083X), 2014, 17(6): 10-13. [14] Han L M, Wang L.Research on power system security[J]. Private Technology (S1673-4033), 2015 (12): 52-52. [15] Tong X Y, Wang X R.Inference and countermeasure presupposition of network attack in incident on Ukrainian power grid[J]. Automation of Electric Power Systems (S1000-1026), 2016, 40(7): 144-148. [16] Liu N, Yu X H, Zhang J H.Coordinated cyber-attack: inference and thinking of incident on Ukrainian power grid[J]. Automation of Electric Power Systems (S1000-1026), 2016, 40(6): 144-147. [17] Zhao J H, Liang G Q, Wen F S, et al.Lessons learnt from Ukrainian blackout: protecting power grids against false data injection attacks[J]. Automation of Electric Power Systems (S1000-1026), 2016 (7): 149-151. [18] Greiman V A.Cyber attacks: the fog of identity[C]// International Conference on Cyber Conflict. USA: IEEE, 2017. [19] Peter, Fairley.US public utilities' network security system needs to be upgraded[J]. Technology Overview (S2095-4409), 2016 (5): 9-11. [20] Jing Y F.The study of DoS attack and design of host secure recovery system [D]. Jinan: Shandong University of Science and Technology, 2004. [21] Liang J, Sankar L, Kosut O.Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation[J]. IEEE Transactions on Power Systems (S0885-8950), 2015, 31(5): 3864-3872. [22] Wang L.Application study on vulnerability assessment in power system security defense system [D]. Beijing, China: North China Electric Power University (Beijing), 2005. [23] Sun B L.Networked control systems and their security issues[J]. Office Automation (S1007-001X), 2011 (4): 45-49. [24] Zhu J, Zhang G X, Wang T, et al.Overview of Fraudulent Data Attack on Power System State Estimation and Defense Mechanism[J]. Power Grid Technology (S1000-3673), 2016, 40(8): 2406-2415. [25] Chen-Ching Liu, Jung J,Heydt G T, et al.The Strategic Power Infrastructure Defense System[J]. IEEE Control Systems Magazine (S1066-033X), 2003, 13(8): 40-52. [26] Sun S, Yan J, Yu Z, et al.Research of power system online dynamic security assessment application expansion[C]// International Conference on Advances in Power System Control, Operation & Management. Hong Kong: IET, 2017. |