메뉴 건너뛰기




Volumn 29, Issue 1, 2005, Pages 35-39

A survey to design method of security architecture for power information systems

Author keywords

Power information systems; Risk management method; Security architecture design method; System of systems

Indexed keywords

COMPUTER AIDED DESIGN; ELECTRIC POWER DISTRIBUTION; PROBLEM SOLVING; RISK MANAGEMENT; SECURITY SYSTEMS; STRUCTURAL DESIGN;

EID: 12344298236     PISSN: 10003673     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (18)

References (21)
  • 1
    • 12344251207 scopus 로고    scopus 로고
    • Chinese source
  • 3
    • 12344274815 scopus 로고    scopus 로고
    • Chinese source
  • 4
    • 0043275386 scopus 로고    scopus 로고
    • Consideration of information security for electric power industry
    • Hu Yan, Dong Mingchui, Han Yingduo. Consideration of information security for electric power industry[J]. Automation of Electric Power Systems, 2002, 26(7): 1-4.
    • (2002) Automation of Electric Power Systems , vol.26 , Issue.7 , pp. 1-4
    • Hu, Y.1    Dong, M.2    Han, Y.3
  • 5
    • 12344321975 scopus 로고    scopus 로고
    • Chinese source
  • 6
    • 10844273792 scopus 로고    scopus 로고
    • Security analysis and countermeasures of real-time dispatching data network for regional power supply network
    • Zhou Shiyue, Wang Jinsong, Jin Xiaoda. Security analysis and countermeasures of real-time dispatching data network for regional power supply network [J]. Power System Technology, 2003, 27(10): 52-55.
    • (2003) Power System Technology , vol.27 , Issue.10 , pp. 52-55
    • Zhou, S.1    Wang, J.2    Jin, X.3
  • 7
    • 12344249112 scopus 로고    scopus 로고
    • Chinese source
  • 8
    • 3242809780 scopus 로고    scopus 로고
    • Security analysis of real-time systems in Huaneng Shanghai Shidongkou No.2 power plant and their protection measures
    • Chen Siqin. Security analysis of real-time systems in Huaneng Shanghai Shidongkou No.2 power plant and their protection measures[J]. Power System Technology, 2004, 28(11): 72-75.
    • (2004) Power System Technology , vol.28 , Issue.11 , pp. 72-75
    • Chen, S.1
  • 9
    • 12344253294 scopus 로고    scopus 로고
    • Chinese source
  • 10
    • 1542504562 scopus 로고    scopus 로고
    • A method for the structured security architecture design of secondary systems
    • Hu Yan, Xin Yaozhong, Han Yingduo. A method for the structured security architecture design of secondary systems[J]. Automation of Electric Power Systems, 2003, 27(21): 63-67.
    • (2003) Automation of Electric Power Systems , vol.27 , Issue.21 , pp. 63-67
    • Hu, Y.1    Xin, Y.2    Han, Y.3
  • 12
    • 12344271467 scopus 로고    scopus 로고
    • Chinese source
  • 13
    • 2542491170 scopus 로고    scopus 로고
    • Power system security and its prevention
    • Han Zhenxiang , Cao Yijia. Power system security and its prevention[J]. Power System Technology, 2004, 28(9): 1-6.
    • (2004) Power System Technology , vol.28 , Issue.9 , pp. 1-6
    • Han, Z.1    Cao, Y.2
  • 14
    • 0036469431 scopus 로고    scopus 로고
    • Security: Technical, social, and legal challenges
    • Bill Arbaugh. Security: technical, social, and legal challenges [J]. Computer, 2002, 35(2): 109-111.
    • (2002) Computer , vol.35 , Issue.2 , pp. 109-111
    • Arbaugh, B.1
  • 16
    • 12344312596 scopus 로고    scopus 로고
    • Chinese source
  • 18
    • 12344310634 scopus 로고    scopus 로고
    • Chinese source


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.