1 |
Vulnerability Assessment, SANS Institute InfoSec Reading Room, http://www.sans.org/
|
2 |
한국전력공사, 한국전기연구원, 서울대학교, "전기요금 수준별 적정 정전손해배상 범위설정 및 리스크 분산방안에 관한 연구", 2011
|
3 |
Felix F.Wu, Yixin Ni, Ping Wei, "Power Transfer Allocation for Open Access Using Graph Theory- Fundamentals and Applications in Systems Withut Loopflow", ieee transactions on power systems, VOL.15, NO.3, 2000
|
4 |
Chee-Wooi Ten and Chen-Ching Liu, "Vulnerability Assessment of Cybersecurity for SCADA Systems, IEEE Transactions on Power Systems", 2008
|
5 |
산업통산자원부, "스마트그리드 국가로드맵", 2010
|
6 |
한전 KDN, "송변전자동화시스템", 2010
|
7 |
Lawrence Carin, George Cybenko, "Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity, The QuERIES Methodology", 2007
|
8 |
S. Massoud Amin, "Cyber and Critical Infrastructure Security - Toward Smarter and More Secure Power and Energy Infrastructures", Canada-U.S. Workshop on Smart Grid Technologies at Vancouver, 2010
|
9 |
Matias Negrete-Pincetic, Felipe Yoshida, George Gross, "Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment", 2009
|