[1] Farhangi H.The path of the smart grid[J].IEEE Power and Energy Magazine,2010,8(1):18.
[2] 何光宇,孙英云,梅生伟,等.多指标自趋优的智能电网[J].电力系统自动化,2009,33(17):1.
[3] Kuzlu M,Pipattanasomporn M,Rahman S.Communication network requirements for major smart grid applications in HAN,NAN and WAN[J].Computer Networks,2014,67:74.
[4] McDaniel P.Security and privacy challenges in the smart grid[J].IEEE Security and Privacy,2009,7(3):75.
[5] 许颖梅.基于Web数据流技术的网络入侵检测研究[J].郑州轻工业学院学报:自然科学版,2012,27(3):11.
[6] 王汝传,王华,徐小龙.基于移动代理的入侵检测系统模型的研究[J].通信学报,2004,25(1):22.
[7] 王晋,李德全,冯登国.一种基于移动代理自动优化的分布式入侵检测系统[J].计算机研究与发展,2006,43(1):9.
[8] Berthier R,Sanders W H,Khurana H.Intrusion detection for advanced metering infrastructures:requirements and architectural directions[C]//IEEE International Conference on Smart Grid Communications,Piscataway:IEEE,2010:350-355.
[9] Jokar P,Nicanfar H,Leung V C M.Specification-based intrusion detection for home area networks in smart grids[C]//IEEE International Conference on Smart Grid Communications,Piscataway:IEEE,2011:208-213.
[10] Beigi-Mohammadi N,Misic J,Khazaei H,et al.An intrusion detection system for smart grid neighborhood area network[C]//IEEE International Conference on Communications,Piscataway:IEEE,2014:4125-4130.
[11] Jungwon K,Bentley P J.Towards an artificial immune system for network intrusion detection:An investigation of dynamic clonal selection[C]//Proceeding of the 2002 Congress on Evolutionary Computation,Piscataway:IEEE,2002:1015-1020.