Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Kuang Xiaoyun"'
Publikováno v:
In Measurement March 2019 135:593-605
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2021 6th International Conference on Image, Vision and Computing (ICIVC).
With the rapid construction and popularization of smart grid, the security of data in smart grid has become the basis for the safe and stable operation of smart grid. This paper proposes a data security threat discovery model for smart grid. Based on
Publikováno v:
2021 6th International Conference on Image, Vision and Computing (ICIVC).
With the increasing scale of power system, power grid data presents complex and changeable characteristics: knowledge structure is complex, isomerization knowledge is increasing; knowledge changes rapidly, and update frequency is gradually shortened.
Publikováno v:
2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE).
At present, the security protection of distribution automation system is faced with complex and diverse operating environment, and the main use of public network may bring greater security risks, there are still some deficiencies. According to the ac
Publikováno v:
2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE).
The security protection function of the existing power distribution terminals is mainly achieved by external encryption devices. Aiming at the serial port problems of large transmission delay and low transmission speed, which is between power distrib
Publikováno v:
CBD
Network intrusion detection system (NIDS) plays an important role in network security. It can detect the malicious traffic and prevent the network intrusion. Traditional methods used machine learning techniques such as support vector machine, Bayesia
Publikováno v:
2020 IEEE International Conference on Information Technology,Big Data and Artificial Intelligence (ICIBA).
The SM4 cryptographic algorithm is one of the standards of commercial cryptographic algorithm in China, which is used widely in the data encryption and other application scenarios for the advantages of less resources and fast speed. The attackers att
Publikováno v:
SmartBlock
With the deep integration of industrialization and informatization, the network environment is becoming more and more complex, and security is facing a huge threat. Recently, the industrial control systems pose an open trend, so the strategy of preve
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.