[1]
ZHAO Junhua, WEN Fushun, XUE Yusheng, LI Xue, DONG Zhaoyan: Cyber Physical Power Systems: Architecture, Implementation Techniques and Challenges. Automation of Electric Power Systems Vol. 34-16(2010), pp.1-7.
Google Scholar
[2]
LIN Yu-feng, ZHONG Jin, Felix Wu: Discussion on smart grid supporting technologies. Power System Technology Vol. 3-12(2009), pp.8-14.
Google Scholar
[3]
HU Xue-hao: Smart grid—A development trend of future power grid. Power System Technology Vol. 33-14(2009), pp.1-5.
Google Scholar
[4]
ZHANG Wen-liang, LIU Zhuang-zhi, WANG Ming-jun: Research status and development trend of smart grid. Power System Technology Vol. 33-13(2009), pp.1-11.
Google Scholar
[5]
Thomas Chen, Juan Carlos Sanchez-Aarnoutse: Petri Net Modeling of Cyber-Physical Attacks on Smart Grid. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.741-749.
DOI: 10.1109/tsg.2011.2160000
Google Scholar
[6]
Oliver Kosut, Liyan Jia, Robert Thomas, and Lang Tong: Malicious Data Attacks on the Smart Grid. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.645-658.
DOI: 10.1109/tsg.2011.2163807
Google Scholar
[7]
Le Xie, Yilin Mo, and Bruno Sinopoli: Integrity Data Attacks in Power Market Operations. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.659-666.
DOI: 10.1109/tsg.2011.2161892
Google Scholar
[8]
Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, and Mansoor Alam: Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.796-808.
DOI: 10.1109/tsg.2011.2159818
Google Scholar
[9]
ZHANG Huan Guo, CHEN Lu, ZHANG Li Qiang: Research on trusted network connection. Chinese Journal of Computers Vol 33(2010), pp.706-716.
DOI: 10.3724/sp.j.1016.2010.00706
Google Scholar
[10]
LIN Chuang, PENG Xue-Hai: Research on trustworthy networks. Chinese Journal of Computers Vol 28-5(2005), pp.751-758.
Google Scholar
[11]
TCG. TNC Architecture V1. 4 R4. https: /www. trustedcomputinggroup. org.
Google Scholar
[12]
Zhang-Huanguo, Chen-Lu, Zhang-Liqiang: Research on Trusted Network Connection. Journal of Computer Vol 33-1, pp.706-716.
Google Scholar