Wind farm security: attack surface, targets, scenarios and mitigation
暂无分享,去创建一个
[1] Shuangwen Sheng,et al. Report on Wind Turbine Subsystem Reliability - A Survey of Various Databases (Presentation) , 2013 .
[2] Jing Ma,et al. A security framework for the wind farm communication network , 2011, 2011 4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT).
[3] Wenxia Liu,et al. A security mechanism of Web Services-based communication for wind power plants , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[4] Wei-Jen Lee,et al. System impact study for the interconnection of wind generation and utility system , 2005, IEEE Transactions on Industry Applications.
[5] O. Anaya-Lara,et al. Communications Requirements and Technology for Wind Farm Operation and Maintenance , 2006, First International Conference on Industrial and Information Systems.
[6] Sujeet Shenoi,et al. A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.
[7] Sujeet Shenoi,et al. Attack taxonomies for the Modbus protocols , 2008, Int. J. Crit. Infrastructure Prot..
[8] Turan Gonen,et al. Electric Power Distribution Engineering , 2014 .
[9] William Shaw,et al. Cybersecurity for SCADA Systems , 2006 .
[10] Chen-Ching Liu,et al. Cyber intrusion of wind farm SCADA system and its impact analysis , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[11] Zhe Chen,et al. Study of LANs access technologies in wind power system , 2010, IEEE PES General Meeting.
[12] Zhe Chen,et al. Intelligent control on wind farm , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).
[13] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[14] Sean W. Smith,et al. YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems , 2008, SEC.