期刊文献+

电力监控系统的脆弱性量化模型研究 被引量:1

The research of quantitative vulnerability of power monitoring system
下载PDF
导出
摘要 电力监控系统的脆弱性量化的研究,对于评估电力系统的安全有着重要的意义。利用层次分析法(AHP,analytic hierarchy process)对电子监控系统的脆弱度因子进行量化,并且根据IEC 61850标准构建了评估算例。实验结果表明,该方法能有效量化系统脆弱度,对安全策略的制定具有指导作用。 Study on quantitative vulnerability power monitoring system, has important significance to assess the safety of the power system. Using the analytic hierarchy process to the electronic monitoring system vulnerability factor is quantified, and according to the IEC 61850 standard to construct the evaluation example. The experimental results show that, the method can effectively quantify system vulnerability, provide guidance for security strategy.
作者 李素若
出处 《华北电力大学学报(自然科学版)》 CAS 北大核心 2013年第5期70-74,共5页 Journal of North China Electric Power University:Natural Science Edition
基金 国家自然科学基金资助项目(60975050) 福建省自然科学基金资助项目(2012J01248)
关键词 电力监控系统 脆弱性 量化 模型 power monitoring system vulnerability quantitative model
  • 相关文献

参考文献9

二级参考文献88

共引文献578

同被引文献17

  • 1GB/T20984-2007信息技术信息安全风险评估规范[S].2007.
  • 2Sridhar S, Hahn A, Govindarasu M. Cyber - physical system security for the electric power grid [ J ]. Pro- ceedings of the IEEE, 2012, 100 ( 1 ) : 210 - 224.
  • 3Mo Y, Kim T H H, Brancik K, et al. Cyber - physi- cal security of a smart grid infrastructure [ J]. Proceed- ings of the IEEE, 2012, 100 (1): 195 -209.
  • 4Yang Q, Yang J, Yu W, et al. On False Data Injection Attacks against Power System State Estimation: Model- ing and Counter measures [J]. 2013.
  • 5Sommestad T, Ekstedt M, Johnson P. Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models [ C]. HICSS, 2009. 1 - 10.
  • 6Sommestad T, Ekstedt M, Nordstrom L. Modeling se- curity of power communication systems using defense graphs and influence diagrams [ J ]. Power Delivery, IEEE Transactions on, 2009, 24 (4) : 1801 -1808.
  • 7Wang W, Lu Z. Cyber security in the Smart Grid: Sur- vey and challenges [ J]. Computer Networks, 2013, 57 (5) : 1344 -1371.
  • 8IEC/TS 62351 - 1 Power systems management and asso- ciated information exchange-data and communications security. Part 1: Communication network and system security introduction to security issues [ S]. 2007.
  • 9ISO/IEC 27002, Information technology - Security techniques-information security management guidelines for telecommunications organizations [ S]. 2008.02.
  • 10Vukovic 0, Su K C, Dan G, et al. Network-aware mitigation of data integrity attacks on power system state estimation [ J ]. Selected Areas in Communications,IEEE Journal on, 2012, 30 (6): 1108-1118.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部