1 |
Coutinho, M.P., Lambert-Torres, G., da Silva L.E.B., Lazarek, H., “Detecting Attacks in Power System Critical Infrastructure Using Rough Classification Algorithm”, Proceedings of the First International Conference on Forensic Computer Science, No.1, Vol.1, November 2006, pps. 93-99, Brasil.
|
2 |
Bigham, J., Gamez D., and Ning Lu, “Safeguarding SCADA Systems with Anomaly Detection”, V.Gorodetsky et al.(Eds.):MMM-ACNS 2003, LNCS 2776, pp.171-182, Springer-Verlag Berlin Heidelberg, 2003.
|
3 |
Pollet, Jonathan, “Developing a Solid SCADA Security Strategy”, Plant Data Technologies, August 8, 2002.
|
4 |
Mitias Negrete-Pincetic, Felipe Yoshida, George Gross, “Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environments”, PowerTech 2009.
|
5 |
한국전기연구원, 인천대학교, “계통계획을 위한 산업용 수용가의 공급지장비 조사 연구”, 산업자원부, 2008. 02.
|
6 |
Michael J. Sullivan et al, How to Estimate the Value of Service Reliability Improvements, http://certs.lbl.gov/pdf/lbnl-3529e.pdf.
|
7 |
한국전기연구원, TWBP 시장에서의 가격상한 설정에 관한 연구, 한국전력거래소, 2003.10.
|
8 |
W. E. Montgomergy(1972), “Markets in Licenses and Efficient Pollution Control Programs,” Journal of Economic Theory, Vol.5, Issue 3, pp.395-418.
DOI
|
9 |
Schainker, R., Douglas, J., Kropp, T., "Electric Utility Responses to Grid Securities Issues", IEEE Power & Energy Magazine, March/April 2006.
DOI
|