3Schneider K, Liu C, Paul J P. Assessment of interactions between power and telecommunications infrastructures [J]. IEEE Transactions on Power Systems, 2006, 21(3): 1123-1130.
4Ten C, Liu C, Manimaran G. Vulnerability assessment of cybersecurity for SCADA systems[J]. IEEE Transactions on Power Systems, 2008, 23(4): 1836-1846.
5Bobbio A, Bonanni G, Ciancamerla E, et al. Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network[J]. Reliability Engineering & System Safety, 2010, 95(12): 1345-1357.
6Ericsson G N. Cyber security and power system communication-essential parts of a smart grid infrastructure[J]. IEEE Transactions on Power Delivery, 2010, 25(3): 1501-1507.
7Coates G M, Hopkinson K M, Graham S R, et al. A trust system architecture for SCADA network security[J]. IEEE Transactions on PowerDelivery, 2010, 25(1): 158-169.
8Nordstroem L. Assessment of information security levels in power communication systems using evidential reasoning[J]. IEEE Transactions on Power Delivery, 2008, 23(3): 1384-1391.
9] Mak K H, Holland B. Migrating electrical power network SCADA systems to TCP/IP and Ethemet networking[J]. Power Engineering Journal, 2002, 16(6): 305-311.
10Yu X F, Tomsovic K. inequalities for load Application of linear frequency control communication delays[J]. IEEE Transactions on Systems, 2004, 19(3): 1508-1515. matrix with Power.