Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Chaoqun Kang"'
Publikováno v:
Heliyon, Vol 10, Iss 12, Pp e31846- (2024)
The Internet of Things communication protocol is prone to security vulnerabilities when facing increasing types and scales of network attacks, which can affect the communication security of the Internet of Things. It is crucial to effectively detect
Externí odkaz:
https://doaj.org/article/8a576657086d480fabf383df6e8f4fcf
Publikováno v:
Global Energy Interconnection, Vol 6, Iss 6, Pp 758-771 (2023)
As the number of power terminals continues to increase and their usage becomes more widespread, the security of power systems is under great threat. In response to the lack of effective trust evaluation methods for terminals, we propose a trust evalu
Externí odkaz:
https://doaj.org/article/ade6f45bd4cd43d19645d258574e68b7
Publikováno v:
Information, Vol 11, Iss 2, p 105 (2020)
The development and integration of information technology and industrial control networks have expanded the magnitude of new data; detecting anomalies or discovering other valid information from them is of vital importance to the stable operation of
Externí odkaz:
https://doaj.org/article/760d4ed56ccf4448973b3cc2dc91ebc4
Publikováno v:
Information, Vol 10, Iss 10, p 319 (2019)
The authors wish to make the following corrections to this paper [...]
Externí odkaz:
https://doaj.org/article/72df5f8396c6412bb3d4b8f257c5fe0e
Publikováno v:
Information, Vol 10, Iss 8, p 259 (2019)
Mobile edge computing (MEC) effectively integrates wireless network and Internet technologies and adds computing, storage, and processing functions to the edge of cellular networks. This new network architecture model can deliver services directly fr
Externí odkaz:
https://doaj.org/article/d1144f32a3544b60a9251d1c8c3092f1
Latency-Based Dynamic Controller Assignment in Hybrid SDNs: Considering the Impact of Legacy Routers
Publikováno v:
Future Internet, Vol 11, Iss 8, p 168 (2019)
Software-defined networking (SDN) is a modern network architecture, which separates the network control plane from the data plane. Considering the gradual migration from traditional networks to SDNs, the hybrid SDN, which consists of SDN-enabled devi
Externí odkaz:
https://doaj.org/article/f6176f7bf2a6409e9ea3099bc2256673
Publikováno v:
Information, Vol 10, Iss 8, p 251 (2019)
This study focuses on the problem of attack quantification in distribution automation systems (DASs) and proposes a quantitative model of attacks based on the common vulnerability scoring system (CVSS) and attack trees (ATs) to conduct a quantitative
Externí odkaz:
https://doaj.org/article/8b284be9af9b428e983b367936196354
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 43:7807-7819
In order to ensure the safe transmission of the information of the secondary distribution system across the regional network, this paper studies a security monitoring method of the secondary distribution system across the regional network based on th
Publikováno v:
2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI).
Publikováno v:
2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI).