Cleveland, F. (2006) IEC TC57 Security Standards for the power system’s Information Infrastructure—Beyond Simple Encryption. IEEE PES TD 2005/2006, 21-24 May 2006, 1079-1087.
 Lin, C., Wang, Y. and Li, Q.L. (2005) Stochastic Modeling and Evaluation for Network Security. Chinese Journal of Computers, 28, 1943-1956.
 Niu, P.C., Kang, J.T., Li, A.W. and Li, L. (2010) New Operation Form of Power Network Started by Smart Grid. Power System Protection and Control, 38, 240-244.
 Li, W.W., You, W.X. and Wang, X.P. (2011) Survey of Cyber Security Research in Power System. Power System Protection and Control, 39, 140-147.
 Watts, D. (2003) Security & Vulnerability in Electric Power Systems. IEEE 35th North American Power Symposium Conference, Rolla Missouri USA, 20-21-19 October 2003, 559-566.
 Lewis, J.A. (2011) The Electrical Grid as a Target for Cyber Attack.
 Kelic, A., Warren, D.E. and Philips, L.R. (2011) Cyber and Physical Infrastructure Interdependence.
 Anderson, R.S. (2011) Cyber Security and Resilient Systems.
 Department of Homeland Security Office of Cyber Security and Communications National Cyber Security Division (2011) National Cyber Exercise: Cyber Storm. http://cryptome.org/cyberstorm.pdf
 China News Network (2011) Iranian Officials Have Accused the USA and Israel Manufacture of Computer Viruses Destroy Iranian Nuclear Facilities. http://www.chinanews.com/gj/2011/04-17/2977981.shtml
 Headquarters Department of the Army Washington, DC (2011) Infrastructure Risk Management (Army).
 State Electricity Regulatory Commission (2004) Power Monitoring System Security Requirements. Beijing.
 Rinaldi, S.M., Peerenboom, J.P. and Kelly, T.K. (2001) Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems, 21, 11-25. http://dx.doi.org/10.1109/37.969131
 Liu, J.F., Chen, C.P. and Luo, J. (2004) Design and Application of Information’s Security and Protection in Power Supervision and Control Automatic System. Relay, 32, 33-35.
 Wu, G.W. (2007) Information Disposal and Network Security Analysis in Digital Substation. Relay, 35, 18-22.
 Du, G.H. and Wang, Z.F. (2010) Design and Research on Power Network Dispatching Integration of Smart Grid. Power System Protection and Control, 38, 127-131.
 Stamp, J. and Mcintyre, A. (2009) Reliability Impacts from Cyber Attack on Electric Power Systems. The 2009 Power Systems Conference and Exposition, Seattle, 15-18 March 2009, 1-8.
 Tatum, M. (2011) What Is a Cyber attack? http://www.wisegeek.com/what-is-a-cyberattack.htm
 Subs-tations Committee of the IEEE Power Engineering Society (2008) IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE Std 1402-2000(R2008). USA.
 IEC TS 62351-1 (2007) Power Systems Management and Associated Information Exchange—Data and Communications Security Part I: Communication Network and System Security—Introduction to Security Issues. Geneva.
 Li, J. (2011) Academician Disclose the Cyber Attack Is Very Serious in China.
 Mu, L.H., Zhu, G.F. and Zhu, J.R. (2010) Design of Intel-ligent Terminal Based on Smart Grid. Power System Protection and Control, 38, 53-56.
 Han, Y.J., Zhao, N.Q. and Liu, Y.C. (2005) Destructive Mechanism of Blackout Bomb and Its Defending Measures Ordnance Material Science and Engineering, 28, 57-60.
 Zhang, Y.Q. (2011) Network Attack and Defense Technology. Tsinghua University Press, Beijing, 59-65.
 Baigent, D., Adamiak, M. and Mackiewicz, R. (2011) IEC61850 Communication Networks and Systems in Substations: An Overview for Users. http://www.sisconet.com
 Negrete-Pincetic, M., Yoshida, F. and Gross, G. (2009) Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment. Bucharest Power Tech Conference, Romania, 28 June-2 July 2009, 105- 111.
 Liu, N., Zhang, J.H. and Duan, B. (2009) Design of Security Mechanism for Substation Remote Configuration Based on XML Security. Electric Power Automation Equipment, 29, 113-117.
 Taylor, C., Krings, A. and Foss, J.A. (2011) Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening.
 Hu, Y., Xie, X.R., Han, Y.D., et al. (2005) A Survey to Design Method of Security Architecture for Power Information Systems. Power System Technology, 29, 35-39.
 Greenberg, A. (2011) Congress Alarmed at Cyber-Vulnerability of Power Grid.
 Meserve, J. (2011) Staged Cyber Attack Reveals Vulnerability in Power Grid.
 Poulsen, K. (2011) Report: Cyber Attacks Caused Power Outages in Brazil.
 Oman, P., Schweitzer, E. and Roberts, J. (2011) Protecting the Grid from Cyber Attack Part I: Recognizing Our Vulnerabilities. http://www.elp.com/index/display/article-display/130136/articles/utility-automation-engineering-td/volume-6/issue-7/features/protecting-the-grid-from-cyber-attack-part-i-recognizing-our-vulnerabilities.html
 Wikipedia (2011) Stuxnet. http://en.wikipedia.org/wiki/Stuxnet