期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
美国电力行业信息安全运作机制和策略分析 被引量:17
1
作者 朱晓燕 方泉 《中国电力》 CSCD 北大核心 2015年第5期81-88,共8页
网络威胁对电力系统的影响是涉及国家安全、公共安全和国民经济的至关重要的问题。美国已形成了多方协同的电力行业信息安全运作机制。以美国电力行业信息安全的战略框架及其实施策略为切入点,梳理了承担美国电力行业信息安全相关职责... 网络威胁对电力系统的影响是涉及国家安全、公共安全和国民经济的至关重要的问题。美国已形成了多方协同的电力行业信息安全运作机制。以美国电力行业信息安全的战略框架及其实施策略为切入点,梳理了承担美国电力行业信息安全相关职责的政府机构和组织的职责及其工作现状,研究了参与美国电力行业信息安全研究的机构和组织的工作成果。从信息安全标准、安全文化建设、风险管理、协作共享以及网络攻击响应5个角度分析了美国电力行业信息安全运作策略。电力行业信息安全的持续运作和良性发展,不仅需要标准规范的不断完善和主动执行,更需要安全文化、安全风险、应急响应等方面的切实有效的管理和协同。 展开更多
关键词 电力行业 能源传输系统 信息安全 风险管理 协作共享 应急响应
下载PDF
Determination of Energy Interchanged on the Tie Lines- Some Practical Issues 被引量:1
2
作者 Zeljko Modric Zoran Kovac Kresimir Fekete 《Journal of Energy and Power Engineering》 2014年第5期948-956,共9页
The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators... The quality of methods for determining energy transits on the tie lines (lines that connect two neighboring power system) can have significant impact on business activity of the TSOs (transmission system operators). Existing law regulation is not enough precise regarding definition of methods for metering energy transits (energy interchanged between neighboring TSOs). This paper analyses disadvantages of method for line losses metering with electric meters and suggests introduction of the measured value corrections. 展开更多
关键词 Billing point metering set metering point metering error energy transit.
下载PDF
Key Rate of Practical Quantum Communication Network
3
作者 黄娜 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第8期201-205,共5页
The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the... The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment. 展开更多
关键词 quantum key distribution decoy state untrusted source statistical fluctuation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部