• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming

    2015-08-09 04:54:08SongDengDongYueXiongFuandAihuaZhou
    IEEE/CAA Journal of Automatica Sinica 2015年4期

    Song Deng,Dong Yue,Xiong Fu,and Aihua Zhou

    Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming

    Song Deng,Dong Yue,Xiong Fu,and Aihua Zhou

    —Risk assessment is essential for the safe and reliable operation of cyber physical power system.Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account.In order to solve this problem,security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed.Firstly,fast attribution reduction based on binary search algorithm is presented.Secondly,security risk assessment function for cyber physical power system is mined based on gene expression programming.Lastly,security risk levels of cyber physical power system are predicted and analyzed by the above function model.Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining,accuracy of security risk level prediction and strong practicality.

    Index Terms—Gene expression programming,function mining, security risk assessment,cyber physical power system.

    I.INTRODUCTION

    With the increasingly widespread application of information and communication technology,smart grid has gradually evolved into cyber physical system of deep integration between information space and physical space[1-3].

    Because information system affects operation and control of physical system,all kinds of existing information systems with security risks will naturally be introduced into the physical systems.These security risks and vulnerabilities greatly increase the probability of intrusions and attacks on physical power systems from Internet[4-8].Reference[4]presents a security-oriented stochastic risk management technique,which can calculate cyber-physical security indices to measure the security level of the underlying cyber-physical setting.Reference [5-8]analyzed all kinds of attacks on power physical systems, designed countermeasures for simultaneous intrusions,modelbased attack and other network attacks(e.g.,Dos,DDos, replay attack etc).Traditional power outage is caused when safety and reliability of physical systems are destroyed.However,with the increase of complexity in smart grid,all kinds of techniques which attack physical systems through security vulnerabilities of information systems have also increased. Due to dependence of physical power system on information system and control system,vulnerability of control network and complexity of power grid,local and small disturbances of control system by network intrusion attacks can cause collapse of physical systems.Finally,a large area of blackout will be produced.The significant potential security hazard of cyber physical power system(CPPS)is that security of information space will inevitably affect security of physical space so as to form a chain reaction,and eventually lead to the collapse of the physical space[9].Iran’s“Stuxnet”virus crossed the border of information and physical space and led to serious consequences.So,the rapid development of information and communication technology not only improves control capability of power grid,but also gives physical systems to lay security hazards.Timely detection and assessment of various security risks for CPPS is essential for the effective control and solution of security risks in CPPS.

    Song Deng and Dong Yue are with the Research Institute of Advanced Technology,Nanjing University of Post and Telecommunications,Nanjing 210003,China(e-mail:dengsong@njupt.edu.cn;medongy@vip.163.com).

    Xiong Fu is with the School of Computer Science and Technology,Nanjing University of Post and Telecommunications,Nanjing 210003,China(e-mail: xfux@njupt.edu.cn).

    Aihua Zhou is with the State Grid Smart Grid Research Institute,Beijing 102209,China(e-mail:zhouaihua@spri.sgcc.com.cn).

    Risk assessment[10]is probability estimation of risks that threats and vulnerabilities cause.In recent years,risk assessment has been widely applied to many aspects of the power system[11-14].But security risk assessment for cyber physical power system is also unusual.

    However,complexity and dynamic change of CPPS cause the uncertainty of risk assessment.The unsuitable risk assessment methods will greatly affect accuracy of risk assessment. Traditional assessment methods include qualitative assessment,quantitative assessment and the integration of qualitative and quantitative assessment[10].Due to the complexity,nonlinearity and uncertainty of security risk assessment, these assessment methods have some limitations,subjective arbitrariness and fuzziness.The operation of these methods is more complex and lack of ability of self-learning.So,manymethods based on artificial intelligence and machine learning are introduced into security risk assessment.Reference [15]proposed intelligent information security risk assessment based on a decision tree algorithm.Reference[16]presents risk assessment of information security based on improved wavelet neural network.Information security risk assessment based on grey-analytic network process(G-ANP)was proposed in[17].Reference[18]applied fuzzy expert system to information security risk assessment for an attendance system.Because of more security risk elements in CPPS,these methods are easy to lead to high computational load,low accuracy and complex operation of security risk assessment. The essential work in the process of security risk assessment is the construction of the risk level classification model. However,these methods can only be used to divide the risk level,which leads to the difficulty in solving the classification function model linkingrisk level and security risk factors.

    In order to better solve these problems,combining with attribution reduction and function mining,security risk assessment of cyber physical power system based on rough set and gene expression programming(SRACPPS-RGEP)is proposed in this paper.

    This paper makes the following contributions:1)it presents fast attribution reduction based on binary search algorithm; 2)it proposes SRACPPS-RGEP and 3)it describes simulated experiments that have been done and provides performance analysis results.

    The content of this paper is organized as follows.Section II provides fast attribution reduction based on binary search algorithm.Section III introduces SRACPPS-RGEP.Section IV represents experiments and analysis.Finally,conclusions are given in Section V.

    II.FAST ATTRIBUTION REDUCTION BASED ON BINARY SEARCH ALGORITHM

    A.Security Risk Element of CPPS

    For security risk assessment of CPPS,the first thing to do is to analyze security risks of information and physical systems. For the physical systems,[1,19]noted that security risks include matching degree of local power supply,natural disasters, load changes of zone,transmission line fault,supply reliability of zone,small signal stability,transient stability,voltage stability,protection equipment failures,power communication equipment failures etc.For the information systems,[19] noted that security risks of cyber systems include hardware and software failures,physical environment impact,malicious code,cyber-attack,physical attack,leakage,misrepresentation, repudiation,operational error,poor management,unauthorized use and abuse etc.

    In order to better describe security risk element for CPPS, security risk elements’set is defined as follows.

    Definition 1(Security risk elements’set).Let the sets be defined asP={〈p1,v1〉,...,〈pk,vk〉,...,〈pn,vn〉},k∈[1, n],I={〈i1,v1〉,...,〈ij,vj〉,...,〈im,vm〉},j∈[1,m],S={I,P,D},whereIrepresents collection of security riskiof information systems in CPPS and the corresponding risk valuesv,Prepresents collection of security riskpof physical systems in CPPS andv,andDrepresents risk level of CPPS.Sis called security risk elements’set(SRES)of CPPS.

    Definition 2(Security risk decision table).Let decision table beT=〈U,C∪D,V,f〉,whereU,C∪D=R,C=〈I,P〉,C={c1,c2,...,cn},D={d1,d2,...,dm}, andV=∪vr,r∈Rrespectively represent data collection, all cyber and physical security risk collection,risk level collection,risk value and risk level value collection of SRES.f:U×R→Vrepresents information function.?r∈R,x∈U,f(x,r)∈vr.Tis called security risk decision table.

    An example is shown as Table I.

    B.FAR-BSA

    For complex and high-dimensional data sets,direct analysis is very difficult.So,the dimension reduction is necessary.Existing methods on dimension reduction include principal component analysis(PCA),singular value decomposition(SVD) and rough set(RS)etc.,where PCA and SVD inevitably result in the loss of part of the decision information.Dimension reduction based on RS does not change the decision rules of original data[20-21].Due to unique and equivalence of the optimal reduction,we just need to solve any optimal reduction. So,fast attribution reduction based on binary search algorithm (FAR-BSA)is proposed in this paper.

    Firstly,related definitions of FAR-BSA are given as follows[22].

    Definition 3.Let security risk decision table beT=〈U,C∪D,V,f〉,where?P?R,andx,y∈U.?r∈P,if and only iff(x,r)=f(y,r),thenxandyare indiscernible,and denoted byU/RorI N D(P)={(x,y)∈U|?r∈P,f(x,r) =f(y,r)}.

    Definition 4.Let security risk decision table beT=〈U,C∪D,V,f〉,the positive region P O SC(D)=∪{Yi?U/C: Yi?D}.

    TABLE I AN EXAMPLE OF SECURITY RISK DECISION TABLE

    Definition 5.Let security risk decision table be T=〈U, C∪D,V,f〉.Dependence degree between condition attribution C and decision attribution D is denoted by rC(D),if rC(D)= card(P O SC(D))/card(U)=1,then T is consistent,where card(U)represents the number of elements in collection U.

    Definition 6.Let security risk decision table T=〈U, C∪D,V,f〉be consistent.For c?C,if P O SC(D)= P O SC-{c}(D),then condition attribution c is reducible.

    Property 1.Let security risk decision table T=〈U, C∪D,V,f〉be consistent.For c?C,if P O SC(D)= P O SC-{c}(D),then T′=〈U,C-{c}∪D,V,f〉,which reduces condition attribution c to be consistent.

    Proof.From Definition 5,for security risk decision table T =〈U,C∪D,V,f〉,

    as P O SC(D)=P O SC-{c}(D),(2)holds:

    From(1)and(2),rC-{c}(D)equals to 1.It means that T′=〈U,C-{c}∪D,V,f〉is consistent.□

    Definition 7.Let condition attribution set C′be a reduction of security risk decision table T.Reduction which contains the least condition attribution in C′is called the optimal reduction of T.

    Lemma 1.Let security risk decision table T=〈U,C∪D, V,f〉be consistent.S?C,if S is not reduction of T,then?S′?S is not reduction too.

    Proof.Supposing that?S′?S?C is a reduction,then from Property 1,T is still consistent after condition attribution set C removes S′.And because of S′?S,then(C-S)?(C-S′).From Definition 6 and known conditions,we know that security risk decision table T must be consistent after condition attribution set C removes S.Then from Property 1, for S?C,S is reducible too.This conclusion is inconsistent with the known conditions.So the original proposition is right.□

    The basic steps of FAR-BSA are shown as follows.

    Algorithm 1.FAR-BSA(T)

    Input.T=〈U,C∪D,V,f〉,C={x1,x2,...,xn};

    Output.bestReduction;

    Step 1.int m=n/2;

    Step 2.Looping through all reduction for including m conditional attribution in C.If finding a reduction according to coordination of security risk decision table T,then going to Step 3 until finding the optimal reduction,or going to Step 4;

    Step 3.If m equals to 1,then the reduction is the bestReduction.If m equals to n,then bestReduction equals to C. Otherwise,let m equals to m/2,and go to Step 2;

    Step 4.If conditional attribution subset is not a reduction when m equals to n/2,then let m equals to(m+n)/2,and go to Step 2;

    Step 5.return bestReduction.

    III.SRACPPS-RGEP

    Essentially,the risk assessment is to build a nonlinear function among system assets,threats and asset vulnerabilities[16]. In terms of function mining,risk assessment can be seen as a process which mines function model among factors affecting system security and risk level,and determines risk level of the current system based on the function model.Traditional function mining algorithms include regression methods,genetic programming(GP)and gene expression programming (GEP)etc.Regression methods assume that function type is known in advance,then estimate parameters by means of the least squares method[23]or the improved methods,and finally, obtain the function model.These methods depend on a priori knowledge and a lot of subjective factors so that the complex function model is not easy to be built.Moreover,these algorithms have high time complexity and low computation efficiency for complex high-dimensional data.To solve these problems,[24]used GP for mathematical modeling,obtained good experimental results,and avoided the defect of traditional statistical methods.However,the efficiency of function model mined by GP was low.So,a new algorithm which was called GEP was proposed in[25].Compared with GP,efficiency of complex function mined by GEP was improved by 4-6 times.

    Meanwhile,due to complexity of cyber physical power system,factors that affect security of CPPS are massive, complex and diverse.Risk assessment function model directly mined by GEP will lead to higher time complexity.In this paper,security risk assessment for CPPS based on rough set and gene expression programming(SRACPPS-RGEP)is proposed.Firstly,risk factors which affect security of CPPS are reduced by calling Algorithm 1.And then,function model among security risk factors in CPPS is mined by improved GEP.

    A.Code of SRACPPS-RGEP

    Gene code is an important expression form of SRACPPSGEP and described as follows.

    Definition 8.Let function set be F={+,-,?,/},terminal set be T={d1,d2,...,di,...,dm},where m represents the number of security risk elements in CPPS.Then gene which is built according to rules and symbol in[25]is called risk assessment gene(RA-Gene),where head of RA-Gene h is composed of elements of F and T,and tail of RA-Gene t iscomposed of elements of T.Moreover,the lengths of h and t follow the equation:

    where n represents the maximum number of arguments of operator in the gene head.

    SRACPPS-RGEP adopts linear code of fixed length[26]to represent an individual which is called a chromosome.In the meantime,a chromosome is composed of one or more RAGenes.

    B.Population of SRACPPS-RGEP

    In evolution computation,diversity of population directly decides whether the optimal or suboptimal solutions can be obtained.At present,random method is applied to initial population in GEP.But diversity of population is limited.Reference [27]used gene space balance strategy to initialize population and enlarged diversity of initial population.However,the gene space balance strategy cannot dynamically increase diversity of population during the local convergence of GEP.Reference[28]used diversity-guided grading evolution strategy to change diversity of GEP population.But implementation of the algorithm was very complex.In[29],authors dynamically adjusted population size by self-adaptive coefficient.However, the algorithm cannot accurately reflect diversity of the current population.To solve these problems,adjustment of dynamic population based on variable-step(ADP-VS)is proposed in this paper.ADP-VS dynamically adjusts population size of GEP by variable step so as to better increase diversity of the current population and probability of searching the optimal solution.

    The basic steps of ADP-VS are shown as follows:

    Algorithm 2.ADP-VS

    Input.maximum generation Gmax,maximum step Smax, maximum fitness Fmax;

    Output.NewPopulation;

    Begin{

    1.PopSize=500;//size of initial population

    2.θ=0;α=0.01;β=0.05;//setting the initial value of related parameters

    3.for(i=1;i<=Gmax;i++){

    4.if(i%10==0){

    5.if(maximum fitness value of population does not change in 10 generations){

    6.Δ=(Fmax-Fmax[i])/Fmax;//computing error between the largest fitness value of current population and the real maximum fitness value

    7.if(Δ>β){θ=200;PopSize+=θ;}

    8.else if(α<Δ<β) {θ=100;PopSize+=θ;}

    9.else{θ=0;}

    }}}}

    End.

    In Algorithm 2,θ represents step when population size changes,α and β represent upper limit and lower limit of error between the maximum fitness value of current population and the real maximum fitness value respectively.

    C.Description of SRACPPS-RGEP

    To better describe SRACPPS-RGEP,the related concepts are given before risk assessment function mining algorithm is introduced.

    Definition 9.Let risk elements’set of CPPS be S={〈I, V〉,〈P,V〉,D},and then D=f(C1,...,Ck,...,Cn+m),C =I∪P is called risk assessment function(RA-Function).

    Definition 10.Let Foptimalbe the optimal fitness value of risk assessment function based on GEP,Fmaxbe maximum fitness value,then Foptimal/Fmax×100%is called risk assessment function mining success ratio(RAFMSR).

    Definition 11.In SRACPPS-RGEP,fitness function f(i)of the i-th individual is expressed by(3).

    where M is threshold of absolute error and is con firmed by empiric value,Vijrepresents the value predicted by the i-th individual program for fitness case j,Tjis the target value for fitness case j.

    Meanwhile,genetic operation of function mining based on GEP includes selection based on elitism,mutation,IS/RIS/-Gene transposition,one-point/two-point/gene recombination etc.

    The process of SRACPPS-RGEP is shown as follows.

    Algorithm 3.SRACPPS-RGEP

    Input.T=〈U,C∪D,V,f〉,population size PopSize, maximum iterations MaxGen,maximum fitness value MaxFitness,mutation probability Pm,transposition probability Pt, recombination probability Pr;

    Output.the optimal risk assessment function BestRiskAss-Fun.

    Begin{

    1.Call FAR-BSA(T);//reduce security risk decision table

    2.Initialization of Population S;//initial population according to reduced decision table T

    3.gen=0;

    4.While(f itness<M axF itness)or(gen<M axGen)

    {

    5.GeneticOpertion(S);//selection,mutation,transposition,and recombination operators are done

    6.Calculating fitness value of every individual in population;

    7.Keeping the best individuals;

    8.f itness=B estf itness;

    9.gen++;}

    10.return BestRiskAss-Fun.

    D.Application Analysis of SRACPPS-RGEP

    From introduction,it is known that security assessment or vulnerability assessment is considered from the point of physical system or information system in CPPS.SRACPPSRGEP takes information system and physical system as a whole to consider security risk assessment.It is vital to safe and reliable operation of CPPS.Meanwhile,massive security risk logs obtained from CPPS are stored in existing power security defense system.Security risk model is extracted from these security risk logs by SRACPPS-RGEP.Finally,the model can be a basis of decision-making in safe and reliable operation of CPPS.

    In order to better apply SRACPPS-RGEP to power security defense system,firstly,interface of security risk logs in CPPS is given;secondly,SRACPPS-RGEP analyzes security risk logs in CPPS by the interface,moreover,analysis and computing will be transplanted to distributed computing platform (such as cloud computing,etc.);lastly,results will be returned to power security defense system as a basis for adjustment of operation control strategy.The whole process is shown in Fig.1.

    Fig.1.Application process of SRACPPS-RGEP.

    In Fig.1,SRACPPS-RGEP is deployed on the private cloud computing platform in power grid.The algorithm can analyze security risk log of CPPS in parallel by interface and return results to power security defense system.

    IV.EXPERIMENTS AND ANALYSIS

    In order to better verify the feasibility and effectiveness of the algorithms in this paper,simulation experiments are done in a laboratory environment.Two experiments are given on the following platform:Intel i5 2.3 GHz+2 G+Win7+Java etc.

    The experimental data is mainly from China Southern Grid Provincial Power Company.Firstly,security risks of cyber and physical system in the power company are analyzed. Then the corresponding security risk elements’set is obtained. Lastly,security risk decision table is built by the security risk elements’set.In the decision table,the number of condition attribution and decision attribution is 21 and 5,respectively. Decision attribution value includes higher,high,medium,low and lower.The number of data set is 20.After quantification and normalization,training data is composed of top 15 elements,and the remaining data is test data.

    Experiment 1.For the known security risk decision table for CPPS,change of the number of condition attribution based on FAR-BSA is shown in Table II.The optimal attribution reduction based on FAR-BSA,PCA,SVD,attribution reduction algorithm based on positive region(AR-PR),attribution reduction algorithm based on discernable matrix(AR-DM), GEP-ARRS[26]and TS-ARRS[30]is shown in Table III.Fig.2 shows comparison of time-consumption in which the optimal attribution reduction is obtained respectively based on FARBSA,PCA,SVD,AR-PR,AR-DM,GEP-ARRS and TSARRS under the condition that the algorithm runs 5 times.

    TABLE II CHANGED OF THE NUMBER OF CONDITION ATTRIBUTION BASED ON FAR-BSA

    TABLE III COMPARISON OF AND OPTIMAL REDUCTION BASED ON SEVEN ATTRIBUTION REDUCTION ALGORITHMS

    It is well known that the optimal attribution reduction is not unique for invariant condition attributions.From Table II, we know that FAR-BSA is effective for solving an optimal attribution reduction.After reduction,the number of condition attribution reduces to about 76.19%.In all condition attribution,only five condition attributions including local power matching degree,small signal stability,voltage stability, operational error,and unauthorized use and abuse are retained so that complexity of function mining by GEP will be greatly reduced.Meanwhile,according to rough set theory,attribution reduction does not change the ability to decide risk level of CPPS.

    From Table III,an optimal reduction based on FAR-BSA, AR-PR,AR-DM,GEP-ARRS and TS-ARRS includes five condition attributions.An optimal reduction based on PCAand SVD includes respectively seven and eight condition attributions,where the optimal reduction based on FAR-BSA, AR-PR,AR-DM,GEP-ARRS and TS-ARRS does not result in loss of the original decision information.While attribution reduction based on PCA and SVD will inevitably result in partial loss of the original decision information.

    Fig.2.Time-consumption for an optimal reduction based on the seven algorithms.

    Experiment 2.On the basis of Experiment 1,for security risk decision table in CPPS after reduction,performance of SRACPPS-RGEP is described in Experiment 2.Parameters of GEP are shown in Table IV.Fig.3 shows comparison of difference between optimal and maximum fitness value by GEP before and after reduction.Under the condition that SRACPPS-RGEP runs 5 times,comparison of average timeconsuming before and after reduction is shown in Fig.4.Fig.5 describes error between maximum fitness value of current population and real maximum fitness value with increase of population size.Figs.6 and 7 show respectively the comparison between model value by SRACPPS-RGEP and real value for training and test data.

    Fig.3.Comparison of difference between optimal and maximum fitness value before and after reduction.

    Fig.4.Comparison of average time-consumption of GEP before and after reduction.

    Fig.5.Comparison of error between maximum fitness value of current population and real maximum fitness value.

    Fig.6.Comparison between the values of training data and model.

    Fig.7.Comparison between the values of test data and model.

    From Fig.3,we know that in comparison with difference between optimal and maximum fitness value before the reduction,difference after the reduction has been maximally decreased about 89.81%.Function mining success ratio has been maximally reached about 99.86%.This means that for high-dimensional data sets,attribution reduction greatly improves success probability of function mining without changing decision capability of existing data sets.Fig.4 shows that attribution reduction greatly reduces average time-consuming of security risk assessment function model based on GEP for the same security risk decision table.Average time-consuming has been maximally dropped about 56.52%under the same GEP parameters.This is mainly because that complexity of GEP population has been drastically simplified by reduction.

    Optimal risk assessment function model by SRACPPSRGEP is shown as(4).

    From Fig.5,we know that with the increase of population size,error between maximum fitness value of current population and real maximum fitness value gradually declines.This is because that adjustment strategy of dynamic population based on variable-step is applied to dynamically increase population size and diversity of individual,thereby increase solution of the optimal individual.Meanwhile,degree of fitness between real value and model value of train data and test data for security risk decision table is shown respectively in Figs.6 and 7.From Fig.6,we can see that maximum error between model value and real value of security risk train data by(5) is 0.7441,and minimum error is 0.004.Fig.7 indicates that maximum error between model value and real value of test data by(5)is 0.3091,and minimum error is 0.0497.It can be seen that the model has high prediction accuracy.

    TABLE IV PARAMETERS OF GEP

    For security risk assessment of CPPS,the higher prediction accuracy of security risk assessment function model based on SRACPPS-RGEP is,the higher accuracy of assessment for security risk level of CPPS is.

    V.CONCLUSION

    With deep integration of information systems and physical systems in smart grid,various types of security risks of information systems will affect the normal operation of the physical system.Security risks of cyber physical power system need to be timely found and evaluated because handling of these security risks are essential for safe and reliable operation of cyber physical power system.In this paper,for better and faster solution of optimal attribute reduction on security risk decision table for CPPS,fast attribution reduction based on binary search algorithm(FAR-BSA)is firstly proposed.On the basis of FAR-BSA,security risk assessment algorithm for cyber physical power system based on rough set and gene expression programming(SRACPPS-RGEP)is described.Experimental results show that SRACPPS-RGEP can quickly discover optimal security risk function model,and the functionmodel has high predictive accuracy.This will provide good foundation for timely and accurate assessment and prediction of security risk in CPPS in the future.

    The existing power information security defense system does not take security assessment of CPPS into account.In the future,the SRACPPS-RGEP can be used as an important part of existing power information security defense system, and provide comprehensive security situation assessment for power system of China from information region to production and control region.

    REFERENCES

    [1]Zhao Jun-Hua,Wen Fu-Shuan,Xue Yu-Sheng,Li Xue,Dong Zhao-Yang.Cyber physical power systems:architecture,implementation techniques and challenges.Automation of Electric Power Systems,2010, 34(16):1-7(in Chinese)

    [2]Ju Ping,Qin Chuan,Huang Hua,Wu Feng,Jin Yu-Qing.Research trends of power system modeling geared to smart grid.Automation of Electric Power Systems,2012,36(11):1-6(in Chinese)

    [3]Yu Yi-Xin,Luan Wen-Peng.Basic philosophy of smart grid.Journal of Tianjin University,2011,44(5):377-384(in Chinese)

    [4]Vellaithurai C,Srivastava A,Zonouz S,Berthier R.CPINDEX:cyberphysical vulnerability assessment for power-grid infrastructures.IEEE Transactions on Smart Grid,2015,6(2):566-575

    [5]Hong J H,Liu C C,Govindarasu M.Integrated anomaly detection for cyber security of the substations.IEEE Transactions on Smart Grid, 2014,5(4):1643-1653

    [6]Sridhar S,Govindarasu M.Model-based attack detection and mitigation for automatic generation control.IEEE Transactions on Smart Grid, 2014,5(2):580-591

    [7]Zonouz S,Davis C M,Davis K R,Berthier R,Bobba R B,Sanders W H.SOCCA:a security-oriented cyber-physical contingency analysis in power infrastructures.IEEE Transactions on Smart Grid,2014,5(1):3-13

    [8]Hu J K,Pota H R,Guo S.Taxonomy of attacks for agent-based smart grids.IEEE Transactions on Parallel and Distributed Systems,2014, 25(7):1886-1895

    [9]Mei Sheng-Wei,Wang Ying-Ying,Chen Lai-Jun.Overviews and prospects of the cyber security of smart grid from the view of complex network theory.High Voltage Engineering,2011,37(3):672-679(in Chinese)

    [10]Feng Deng-Guo,Zhang Yang,Zhang Yu-Qing.Survey of information security risk assessment.Journal of China Institute of Communications, 2004,25(7):10-18(in Chinese)

    [11]Guo Chuang-Xin,Yu Bin,Guo Jia,Wen Bo-Jian,Zhang Jin-Jiang, Zhang Li,Lu Hai-Bo,Li Bo.Security risk assessment of the IEC61850-based substation automation system.Proceedings of the CSEE,2014, 34(4):685-694(in Chinese)

    [12]Liu N,Zhang J H,Wu X.Asset analysis of risk assessment for IEC 61850-based power control systems,Part I:methodology.IEEE Transactions on Power Delivery,2011,26(2):869-875

    [13]Liu N,Zhang J H,Wu X.Asset analysis of risk assessment for IEC 61850-based power control systems,Part II:application in substation. IEEE Transactions on Power Delivery,2011,26(2):876-881

    [14]Bompard E,Gao C W,Napoli R,Russo A,Masera M,Stefanini A. Risk assessment of malicious attacks against power systems.IEEE Transactions on Systems,Man,and Cybernetics,Part A:Systems and Humans,2009,39(5):1074-1085

    [15]Zhang Li,Yao Yi-Zhan,Peng Jian-Fen,Chen Hong-Bo,Du Yu-Ge. Intelligent information security risk assessment based on a decision tree algorithm.Journal of Tsinghua University(Science and Technology), 2011,51(10):1236-1239(in Chinese)

    [16]Zhao Dong-Mei,Liu Jin-Xing,Ma Jian-Feng.Risk assessment of information security based on improved wavelet neural network.Computer Science,2010,37(2):90-93(in Chinese)

    [17]Zhao Gang,Wu Tian-Shui.Information security risk assessment based on G-ANP.Journal of Tsinghua University(Science and Technology), 2013,53(12):1761-1767(in Chinese)

    [18]Chang L Y,Lee Z J.Applying fuzzy expert system to information security risk assessment-a case study on an attendance system.In: Proceedings of the 2013 International Conference on Fuzzy Theory and Its Applications.Taipei,China:IEEE,2013.346-351

    [19]Wang Bo.Research on Security Risk and Vulnerability Assessment Methods of Complicated Power System[Ph.D.dissertation],Huazhong University of Science and Technology,China,2011.(in Chinese)

    [20]Yin Lin-Zi,Yang Chun-Hua,Wang Xiao-Li,Gui Wei-Hua.An incremental algorithm for attribute reduction based on labeled discernibility matrix.Acta Automatica Sinica,2014,40(3):397-404(in Chinese)

    [21]Jiang Yun-Liang,Yang Zhang-Xian,Liu Yong.Quick distribution reduction algorithm in inconsistent information system.Acta Automatica Sinica,2012,38(3):382-388(in Chinese)

    [22]Pawlak Z.Rough sets.InternationalJournalofComputerandInformation Sciences,1982,11(5):341-356

    [23]Zeng Qing-Hong,Lu De-Tang.Curve and surface fitting based on moving least-squares methods.Journal of Engineering Graphics,2004, 25(1):84-89(in Chinese)

    [24]Koza J R.Genetic Programming II:Automatic Discovery of Reusable Programs.Cambridge:MIT Press,1994.110-199

    [25]Ferreira,C.Gene expression programming:a new adaptive algorithm for solving problems.Complex Systems,2001,13(2):87-129

    [26]Deng S,Wang R C,Fu X,Yang L C.Gene expression programming for attribution reduction in rough set.International Journal of Computers and Applications,2010,32(2):226-231

    [27]Hu Jian-Jun,Tang Chang-Jie,Duan Lei,Zuo Jie,Peng Jing,Yuan Chang-An.The strategy for diversifying initial population of gene expression programming.Chinese Journal of Computers,2007,30(2): 305-310(in Chinese)

    [28]Liu Qi-Hong,Tang Chang-Jie,Hu Jian-Jun,Zeng Tao,Liu Ying-Tian, Qiu Jiang-Tao.Gene expression programming based on diversity-guided grading evolution.Journal of Sichuan University(Engineering Science Edition),2006,38(6):108-113(in Chinese)

    [29]Deng Song,Wang Ru-Chuan.Classification of distributed GEP-BP based on grid service.ActaElectronicaSinica,2009,37(11):2600-2603 (in Chinese)

    [30]Header A R,Wang J,Fukushima M.Tabu search for attribute reduction in rough set theory.Soft Computing,2007,12(9):909-918

    Song Deng Associate professor at the Research Institute of Advanced Technology,Nanjing University of Post and Telecommunication,China.He received the Ph.D.degree in information network from Nanjing University of Post and Telecommunication in 2009.His research interests include intelligent control theory and its application,nonlinear system analysis and optimization,and pattern recognition.

    Dong Yue received the Ph.D.degree from South China University of Technology,China,in 1995.He is currently a professor of the Research Institute of Advanced Technology,Nanjing University of Posts and Telecommunications and also a Changjiang Professor with the Department of Control Science and Engineering,Huazhong University of Science and Technology.He is currently an associate editor of the IEEE Control Systems Society Conference Editorial Board and also an associate editor of the International Journal of Systems Science.Up to now,he has published more than 100 papers in international journals,domestic journals,and international conferences.His research interests include analysis and synthesis of networked control systems,multi-agent systems,optimal control of power systems,and internet of things.Corresponding author of this paper.

    Xiong Fu Associate professor at the School of Computer Science and Technology,Nanjing University of Posts and Telecommunications.He received his B.Sc.and Ph.D.degree in computer science from University of Science and Technology of China, China,in 2002 and 2007,respectively.His research interests include parallel and distributed computing, and cloud computing.

    Aihua Zhou Engineer at the State Grid Smart Grid Research Institute.He received the M.Sc.degree in GIS from Nanjing Normal University in 2008.His research interests include cloud computing and big data in smart grid.

    t

    October 10,2014;accepted April 8,2015.This work was support by National Natural Science Foundation of China(61202354, 51507084)and Nanjing University of Post and Telecommunications Science Foundation(NUPTSF)(NT214203).Recommended by Associate Editor Yilin Mo.

    :Song Deng,Dong Yue,Xiong Fu,Aihua Zhou.Security risk assessment of cyber physical power system based on rough set and gene expression programming.IEEE/CAA Journal of Automatica Sinica,2015, 2(4):431-439

    人体艺术视频欧美日本| 精品卡一卡二卡四卡免费| 一二三四在线观看免费中文在 | 少妇人妻精品综合一区二区| 在线免费观看不下载黄p国产| 国产免费一区二区三区四区乱码| 久久影院123| 免费大片黄手机在线观看| 亚洲国产成人一精品久久久| 十分钟在线观看高清视频www| 中文字幕人妻丝袜制服| 男女下面插进去视频免费观看 | 视频中文字幕在线观看| 精品卡一卡二卡四卡免费| 丝袜脚勾引网站| 亚洲精品中文字幕在线视频| 婷婷色av中文字幕| 亚洲欧美清纯卡通| 美女福利国产在线| 国产精品女同一区二区软件| 一级毛片电影观看| 国产日韩欧美视频二区| 国产精品不卡视频一区二区| 欧美日韩成人在线一区二区| 精品一区在线观看国产| 国产69精品久久久久777片| 精品人妻在线不人妻| 在线看a的网站| 久久久久久伊人网av| 精品少妇内射三级| 久久久a久久爽久久v久久| 久久国产精品大桥未久av| 精品国产一区二区久久| 午夜老司机福利剧场| 高清毛片免费看| 九草在线视频观看| 少妇人妻久久综合中文| 久久精品国产综合久久久 | 亚洲内射少妇av| 五月天丁香电影| 国产成人精品一,二区| 熟女电影av网| 国产精品人妻久久久影院| 美国免费a级毛片| 日韩制服丝袜自拍偷拍| 一级毛片黄色毛片免费观看视频| 中国三级夫妇交换| 欧美精品亚洲一区二区| 伊人久久国产一区二区| 日本91视频免费播放| 在线观看人妻少妇| 久久国产精品男人的天堂亚洲 | 亚洲av电影在线观看一区二区三区| 观看美女的网站| 亚洲欧美清纯卡通| 热re99久久精品国产66热6| 在线观看人妻少妇| 亚洲成av片中文字幕在线观看 | 国产在线视频一区二区| 午夜福利在线观看免费完整高清在| 国产极品天堂在线| 极品人妻少妇av视频| 国产精品人妻久久久影院| 国产成人av激情在线播放| 久久久久精品性色| 麻豆精品久久久久久蜜桃| 亚洲精品国产色婷婷电影| 欧美精品一区二区大全| 亚洲国产精品一区二区三区在线| 汤姆久久久久久久影院中文字幕| 亚洲av成人精品一二三区| 欧美国产精品一级二级三级| 热re99久久国产66热| 亚洲欧美日韩另类电影网站| 伊人久久国产一区二区| 日本av手机在线免费观看| 免费不卡的大黄色大毛片视频在线观看| 日韩制服骚丝袜av| 2018国产大陆天天弄谢| 久久99精品国语久久久| 9热在线视频观看99| 成年人午夜在线观看视频| 美女视频免费永久观看网站| 青春草视频在线免费观看| h视频一区二区三区| 三上悠亚av全集在线观看| 99热这里只有是精品在线观看| 又黄又爽又刺激的免费视频.| 老司机影院毛片| 99热网站在线观看| 97人妻天天添夜夜摸| 免费看不卡的av| 蜜臀久久99精品久久宅男| 国产精品女同一区二区软件| 欧美成人精品欧美一级黄| 欧美激情极品国产一区二区三区 | 欧美3d第一页| 久久女婷五月综合色啪小说| 大片电影免费在线观看免费| 免费看av在线观看网站| 黄色一级大片看看| 国产男人的电影天堂91| 久久久久国产精品人妻一区二区| 精品酒店卫生间| 精品一区二区三区四区五区乱码 | 久久精品人人爽人人爽视色| av又黄又爽大尺度在线免费看| 亚洲国产精品成人久久小说| 国产毛片在线视频| 一级毛片 在线播放| 2021少妇久久久久久久久久久| 丁香六月天网| 亚洲国产精品999| 国产在线免费精品| av电影中文网址| 男人爽女人下面视频在线观看| 一区二区三区乱码不卡18| 精品国产乱码久久久久久小说| 日本-黄色视频高清免费观看| 婷婷色av中文字幕| 久久久国产欧美日韩av| 新久久久久国产一级毛片| 亚洲人成网站在线观看播放| 久久99热这里只频精品6学生| 亚洲天堂av无毛| 男女下面插进去视频免费观看 | www.熟女人妻精品国产 | 国产白丝娇喘喷水9色精品| 丝袜人妻中文字幕| 欧美精品国产亚洲| 日韩欧美精品免费久久| 成人二区视频| 国产不卡av网站在线观看| 成人毛片60女人毛片免费| 免费观看a级毛片全部| 国产视频首页在线观看| 亚洲欧美清纯卡通| 国产欧美日韩一区二区三区在线| h视频一区二区三区| 这个男人来自地球电影免费观看 | 欧美精品av麻豆av| 极品少妇高潮喷水抽搐| freevideosex欧美| 日韩免费高清中文字幕av| 精品一区二区三卡| 精品国产乱码久久久久久小说| av电影中文网址| 久久久精品免费免费高清| 国产精品偷伦视频观看了| 久久99热这里只频精品6学生| 国产在线一区二区三区精| 大话2 男鬼变身卡| 亚洲精品av麻豆狂野| av在线老鸭窝| 亚洲精品自拍成人| 成人无遮挡网站| 日韩电影二区| 国产麻豆69| 男人爽女人下面视频在线观看| 中国美白少妇内射xxxbb| 日韩伦理黄色片| 国产精品熟女久久久久浪| 热99久久久久精品小说推荐| 七月丁香在线播放| 免费看av在线观看网站| 国产免费福利视频在线观看| 亚洲国产精品一区三区| 国产亚洲av片在线观看秒播厂| 一级片免费观看大全| 校园人妻丝袜中文字幕| 免费少妇av软件| 91国产中文字幕| 欧美日韩国产mv在线观看视频| 午夜福利乱码中文字幕| 亚洲欧美成人综合另类久久久| 国产精品熟女久久久久浪| 久久av网站| 日本vs欧美在线观看视频| a 毛片基地| 免费看光身美女| 成人国语在线视频| 国产精品一二三区在线看| 色网站视频免费| 国产片内射在线| 熟妇人妻不卡中文字幕| 亚洲激情五月婷婷啪啪| 亚洲高清免费不卡视频| av视频免费观看在线观看| 日韩伦理黄色片| 在线 av 中文字幕| 久久女婷五月综合色啪小说| 国产精品女同一区二区软件| 超碰97精品在线观看| 两个人免费观看高清视频| 在线看a的网站| 亚洲av.av天堂| 久久97久久精品| 精品亚洲乱码少妇综合久久| 亚洲欧美精品自产自拍| 国国产精品蜜臀av免费| 国产片特级美女逼逼视频| 久久精品国产a三级三级三级| 插逼视频在线观看| 国产男人的电影天堂91| 99热这里只有是精品在线观看| 国产精品女同一区二区软件| 欧美少妇被猛烈插入视频| 韩国高清视频一区二区三区| videosex国产| 亚洲国产精品专区欧美| 美女福利国产在线| 丝袜喷水一区| 久久免费观看电影| 青青草视频在线视频观看| 久久精品国产亚洲av天美| 国产成人精品久久久久久| 男女国产视频网站| 妹子高潮喷水视频| 色94色欧美一区二区| av又黄又爽大尺度在线免费看| 少妇人妻精品综合一区二区| 亚洲丝袜综合中文字幕| 永久网站在线| 欧美人与性动交α欧美精品济南到 | 亚洲人成网站在线观看播放| av在线观看视频网站免费| 国产国拍精品亚洲av在线观看| av不卡在线播放| 亚洲丝袜综合中文字幕| 一区在线观看完整版| 久久精品国产综合久久久 | 菩萨蛮人人尽说江南好唐韦庄| 色视频在线一区二区三区| 亚洲成av片中文字幕在线观看 | 91aial.com中文字幕在线观看| 国产综合精华液| 纯流量卡能插随身wifi吗| 成人亚洲精品一区在线观看| 99香蕉大伊视频| 亚洲综合精品二区| 丝袜喷水一区| 男女啪啪激烈高潮av片| 美女xxoo啪啪120秒动态图| 在线亚洲精品国产二区图片欧美| 最近中文字幕2019免费版| 2018国产大陆天天弄谢| 人妻系列 视频| 亚洲精品一二三| 国产一区二区在线观看av| 精品国产国语对白av| 亚洲少妇的诱惑av| 国产又色又爽无遮挡免| 一区二区三区乱码不卡18| 欧美丝袜亚洲另类| 91精品三级在线观看| 久久99精品国语久久久| 久久精品久久精品一区二区三区| 国产乱人偷精品视频| 久久人妻熟女aⅴ| 大码成人一级视频| 狂野欧美激情性bbbbbb| 国产不卡av网站在线观看| 波多野结衣一区麻豆| 久久午夜福利片| 巨乳人妻的诱惑在线观看| 日韩人妻精品一区2区三区| 人人澡人人妻人| 午夜精品国产一区二区电影| 日韩av在线免费看完整版不卡| 午夜福利影视在线免费观看| 国产精品一区二区在线观看99| 成人18禁高潮啪啪吃奶动态图| 国产xxxxx性猛交| 视频区图区小说| 性色av一级| 满18在线观看网站| 日本欧美国产在线视频| 亚洲成色77777| 黄片播放在线免费| 精品一品国产午夜福利视频| 大片电影免费在线观看免费| 国产又爽黄色视频| 国产一区亚洲一区在线观看| tube8黄色片| 国产极品粉嫩免费观看在线| 晚上一个人看的免费电影| 日韩av不卡免费在线播放| 春色校园在线视频观看| 成人亚洲欧美一区二区av| 免费观看性生交大片5| 国产不卡av网站在线观看| 又粗又硬又长又爽又黄的视频| 久久精品国产鲁丝片午夜精品| 免费观看a级毛片全部| 秋霞在线观看毛片| 丝袜人妻中文字幕| 国产精品99久久99久久久不卡 | 青春草视频在线免费观看| 美女国产视频在线观看| 伊人久久国产一区二区| 精品久久久久久电影网| 韩国精品一区二区三区 | av在线app专区| 精品国产乱码久久久久久小说| 黄网站色视频无遮挡免费观看| 成人毛片a级毛片在线播放| 一级毛片我不卡| 国产成人精品福利久久| 91在线精品国自产拍蜜月| 亚洲国产精品999| 一级毛片电影观看| 精品一品国产午夜福利视频| 一级a做视频免费观看| 亚洲国产毛片av蜜桃av| 一本色道久久久久久精品综合| 内地一区二区视频在线| 亚洲欧美成人综合另类久久久| 美女视频免费永久观看网站| 日本午夜av视频| 丰满饥渴人妻一区二区三| 一级,二级,三级黄色视频| a级毛片黄视频| 天堂中文最新版在线下载| 国产免费一区二区三区四区乱码| 黑丝袜美女国产一区| 黄色毛片三级朝国网站| 国产在线免费精品| 人人妻人人添人人爽欧美一区卜| 亚洲精品美女久久久久99蜜臀 | 色网站视频免费| 91精品国产国语对白视频| 免费在线观看完整版高清| 欧美另类一区| 亚洲精华国产精华液的使用体验| 青春草亚洲视频在线观看| 久久久精品免费免费高清| 国产亚洲欧美精品永久| 亚洲丝袜综合中文字幕| 欧美少妇被猛烈插入视频| 秋霞伦理黄片| 免费av中文字幕在线| 成年动漫av网址| 国产男人的电影天堂91| 亚洲丝袜综合中文字幕| 激情五月婷婷亚洲| 欧美激情 高清一区二区三区| av一本久久久久| 两个人免费观看高清视频| 有码 亚洲区| 欧美97在线视频| 亚洲国产欧美在线一区| 成年动漫av网址| 精品久久久久久电影网| 人妻系列 视频| 中文字幕另类日韩欧美亚洲嫩草| 免费久久久久久久精品成人欧美视频 | 日韩人妻精品一区2区三区| 一二三四中文在线观看免费高清| 久久国产精品男人的天堂亚洲 | 在线亚洲精品国产二区图片欧美| 国产成人精品久久久久久| 最近中文字幕高清免费大全6| 韩国精品一区二区三区 | 国产精品一二三区在线看| 你懂的网址亚洲精品在线观看| 亚洲国产精品一区三区| 一个人免费看片子| 亚洲熟女精品中文字幕| 成年人午夜在线观看视频| 五月开心婷婷网| 亚洲欧洲日产国产| 亚洲精品一区蜜桃| 国产黄色免费在线视频| 性色avwww在线观看| 尾随美女入室| 爱豆传媒免费全集在线观看| 亚洲精品456在线播放app| 人成视频在线观看免费观看| 免费观看无遮挡的男女| 久久久精品免费免费高清| 美女国产视频在线观看| 午夜av观看不卡| 91精品三级在线观看| 国产成人免费观看mmmm| 婷婷色av中文字幕| 大香蕉久久成人网| 久久韩国三级中文字幕| 日韩中文字幕视频在线看片| 人人澡人人妻人| 亚洲五月色婷婷综合| 久久这里有精品视频免费| 欧美日韩视频精品一区| 女人被躁到高潮嗷嗷叫费观| 欧美精品一区二区免费开放| 啦啦啦啦在线视频资源| 91午夜精品亚洲一区二区三区| 国产亚洲精品久久久com| 中文字幕人妻丝袜制服| 女性被躁到高潮视频| 狠狠婷婷综合久久久久久88av| 热re99久久国产66热| 国产一区二区激情短视频 | 亚洲伊人色综图| 少妇人妻 视频| 内地一区二区视频在线| 亚洲av成人精品一二三区| 三上悠亚av全集在线观看| 少妇被粗大猛烈的视频| 熟妇人妻不卡中文字幕| 亚洲av男天堂| 免费少妇av软件| 又粗又硬又长又爽又黄的视频| 亚洲三级黄色毛片| 黑人猛操日本美女一级片| 亚洲人成网站在线观看播放| 精品第一国产精品| 精品人妻熟女毛片av久久网站| 最近中文字幕高清免费大全6| 日韩,欧美,国产一区二区三区| 午夜免费鲁丝| 女人久久www免费人成看片| 日日摸夜夜添夜夜爱| 国产白丝娇喘喷水9色精品| 丝袜美足系列| 免费女性裸体啪啪无遮挡网站| a级毛片黄视频| 精品人妻偷拍中文字幕| 建设人人有责人人尽责人人享有的| 成人手机av| 欧美亚洲日本最大视频资源| 91aial.com中文字幕在线观看| 999精品在线视频| 99香蕉大伊视频| 久久人人97超碰香蕉20202| 亚洲国产av影院在线观看| 极品少妇高潮喷水抽搐| 欧美精品国产亚洲| 午夜免费男女啪啪视频观看| 视频中文字幕在线观看| 性高湖久久久久久久久免费观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 草草在线视频免费看| 亚洲国产精品国产精品| 亚洲国产欧美在线一区| 在线观看免费视频网站a站| 欧美另类一区| 欧美激情国产日韩精品一区| 国产成人免费无遮挡视频| 国产男女超爽视频在线观看| 国产精品嫩草影院av在线观看| 男的添女的下面高潮视频| 黄网站色视频无遮挡免费观看| 欧美日韩视频精品一区| 新久久久久国产一级毛片| 日韩中文字幕视频在线看片| 男女高潮啪啪啪动态图| 免费看不卡的av| 校园人妻丝袜中文字幕| 国产精品一区二区在线观看99| 一本久久精品| 国产永久视频网站| 国产亚洲一区二区精品| 久久久国产一区二区| 免费看不卡的av| 日日爽夜夜爽网站| 中文字幕另类日韩欧美亚洲嫩草| 97人妻天天添夜夜摸| 久久99精品国语久久久| 国产爽快片一区二区三区| av免费在线看不卡| 久久这里有精品视频免费| 视频中文字幕在线观看| 九九在线视频观看精品| 久久久久精品性色| 成人手机av| 乱人伦中国视频| 国产精品人妻久久久影院| 久热这里只有精品99| 黑人欧美特级aaaaaa片| 人人妻人人澡人人爽人人夜夜| 最近手机中文字幕大全| 1024视频免费在线观看| 18禁动态无遮挡网站| 亚洲av.av天堂| 美女中出高潮动态图| 国产精品一区二区在线不卡| 国产在线免费精品| 大香蕉97超碰在线| 18在线观看网站| 女的被弄到高潮叫床怎么办| 一本—道久久a久久精品蜜桃钙片| 亚洲精品久久成人aⅴ小说| 欧美性感艳星| 亚洲av电影在线进入| 五月天丁香电影| 人成视频在线观看免费观看| 啦啦啦啦在线视频资源| 成人国语在线视频| 日韩在线高清观看一区二区三区| 国产免费视频播放在线视频| 亚洲国产精品一区二区三区在线| 天堂俺去俺来也www色官网| 日韩制服骚丝袜av| 成年女人在线观看亚洲视频| 午夜免费鲁丝| 欧美xxⅹ黑人| 欧美丝袜亚洲另类| av片东京热男人的天堂| av视频免费观看在线观看| 久久精品久久精品一区二区三区| 中文字幕人妻丝袜制服| 久久久精品区二区三区| 美女国产视频在线观看| 宅男免费午夜| videossex国产| 久久久久久久久久久久大奶| 国产精品蜜桃在线观看| 国产精品人妻久久久影院| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 最近手机中文字幕大全| 大香蕉久久成人网| 久久久国产欧美日韩av| 久久久久人妻精品一区果冻| 久久女婷五月综合色啪小说| 熟女人妻精品中文字幕| 国产一区二区在线观看日韩| 久久国产精品男人的天堂亚洲 | 亚洲成人av在线免费| 97人妻天天添夜夜摸| 日韩伦理黄色片| 国产免费又黄又爽又色| 日韩成人av中文字幕在线观看| 免费观看av网站的网址| 99热这里只有是精品在线观看| 日本wwww免费看| h视频一区二区三区| 啦啦啦中文免费视频观看日本| av.在线天堂| 亚洲成人一二三区av| 最近最新中文字幕免费大全7| 国产伦理片在线播放av一区| 午夜老司机福利剧场| 这个男人来自地球电影免费观看 | 欧美亚洲日本最大视频资源| 中文精品一卡2卡3卡4更新| 欧美人与善性xxx| 夜夜骑夜夜射夜夜干| 蜜臀久久99精品久久宅男| 91成人精品电影| 久久久久人妻精品一区果冻| 全区人妻精品视频| 国产一级毛片在线| 亚洲av福利一区| 精品人妻熟女毛片av久久网站| 女性被躁到高潮视频| 久久精品国产自在天天线| 久久狼人影院| 嫩草影院入口| 只有这里有精品99| 国产日韩欧美在线精品| 亚洲精品久久午夜乱码| 高清黄色对白视频在线免费看| 黄色 视频免费看| 九色成人免费人妻av| 伦精品一区二区三区| 亚洲av免费高清在线观看| 制服诱惑二区| 国产色婷婷99| 在线观看免费高清a一片| 国产永久视频网站| 伊人久久国产一区二区| 国产精品一区二区在线不卡| 狠狠婷婷综合久久久久久88av| 亚洲精品456在线播放app| 777米奇影视久久| 欧美日本中文国产一区发布| av女优亚洲男人天堂| 国产极品粉嫩免费观看在线| 80岁老熟妇乱子伦牲交| av国产久精品久网站免费入址| 亚洲精品久久久久久婷婷小说| 男女午夜视频在线观看 | 大陆偷拍与自拍| 人妻系列 视频| 成人国语在线视频| 成年人免费黄色播放视频| 国产精品久久久久久精品电影小说| av福利片在线| 两个人免费观看高清视频| 9191精品国产免费久久| 香蕉国产在线看| 午夜福利乱码中文字幕| 亚洲婷婷狠狠爱综合网| 欧美亚洲 丝袜 人妻 在线| 免费黄频网站在线观看国产| 观看美女的网站| 国产精品 国内视频| 伊人久久国产一区二区| 午夜免费鲁丝| 91午夜精品亚洲一区二区三区| 日本91视频免费播放| 亚洲精品久久午夜乱码| 久久久亚洲精品成人影院| 高清在线视频一区二区三区| 亚洲情色 制服丝袜| 最近最新中文字幕大全免费视频 | 精品一区在线观看国产| 精品国产露脸久久av麻豆| 国产精品久久久久久精品古装| 久久久国产一区二区| 成人亚洲欧美一区二区av| 热re99久久精品国产66热6| 一级片'在线观看视频| 色94色欧美一区二区| 婷婷色av中文字幕|