4YOO H, SHON T. Challenges and research directions for heterogeneous cyber physical system based on IEC 61850: vulnerabilities, security requirements, and security architecture [J]. Future Generation Computer Systems, 2016, 61:128 -136.
5Power systems management and associated information exchange data and communications security: IEC 62351 [S]. 2005.
6EPR1. Network system managementz implementation and application of the IEC 62351 7 standard[EB/OL]. [2014-08 -15]. http ://www. epri. com/abstracts/Pages/ProduPTAbstract. aspx? ProductId : 000000003002003738.
7SHENG S, CHAN W L, LI K K, et al. Context information- based cyber security defense of protection system [J]. IEEE Trans on Power Delivery, 2007, 22(3): 1477-1481.
8ZHU L, SHI D, DUAN X. Evidence theory-based fake measurement identification and fault-tolerant protection in digital substations [ J ]. IET Generation, Transmission Distribution, 2011, 5(1): 119-126.
9LIU Xindong, SHAHIDEHPOUR M, LI Zuyi, et al. Power system risk assessment in cyber attacks considering the role of protection systems[R]. 2016.