Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Lisong Shao"'
Autor:
Xiaodong Liu, Xiangke Liao, Shanshan Li, Si Zheng, Bin Lin, Jingying Zhang, Lisong Shao, Chenlin Huang, Liquan Xiao
Publikováno v:
Complexity, Vol 2017 (2017)
Influence maximization problem aims to identify the most influential individuals so as to help in developing effective viral marketing strategies over social networks. Previous studies mainly focus on designing efficient algorithms or heuristics on a
Externí odkaz:
https://doaj.org/article/cc48d38d15cf40a7ade49031d382ae61
Publikováno v:
Connection Science. 33:1094-1115
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has improved the overall operation and monitoring capabilit...
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811947742
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5ce15737aa1994da27110430d0cac1a
https://doi.org/10.1007/978-981-19-4775-9_33
https://doi.org/10.1007/978-981-19-4775-9_33
Publikováno v:
2021 2nd International Conference on Big Data Economy and Information Management (BDEIM).
Research on Quantitative Evaluation Method of Network Security in Substation Power Monitoring System
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811584619
In this paper, the assets, threats, and vulnerabilities of substation power monitoring systems are identified and assigned according to the relevant requirements of national information security risk assessment, and the assignment is optimized in com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::674c6cf957d726a0783d6cf8ac437698
https://doi.org/10.1007/978-981-15-8462-6_85
https://doi.org/10.1007/978-981-15-8462-6_85
Publikováno v:
Advances in Wireless Communications and Applications ISBN: 9789811558788
Detecting compromised devices helps to evaluate the security threats and reduce the security risks in the smart grid. Compared with the alert data in the general sense, the alert data in the smart-grid monitoring system has the features of higher ale
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1356bde518517476488cadd1dafafb2f
https://doi.org/10.1007/978-981-15-5879-5_23
https://doi.org/10.1007/978-981-15-5879-5_23
Publikováno v:
Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control ISBN: 9789811397783
According to the characteristics of the human-machine cloud terminal in the new generation dispatch control system, this paper designs a unified identity authentication system by combining the existing dispatch digital certificate system, face recogn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b42fd78f2b1c51f08e0bd0eb97b39b7a
https://doi.org/10.1007/978-981-13-9779-0_72
https://doi.org/10.1007/978-981-13-9779-0_72
Publikováno v:
Computer Standards & Interfaces. 75:103505
Decentralized Anonymous Credential (DAC) has posed enormous potential in smart grids for protecting user privacy (e.g. preventing user’s daily life from being sketched out). However, the existing DAC protocols still compromise user privacy for a fu
Publikováno v:
ACM Computing Surveys. 48:1-42
Virtual machines (VMs) and virtualization are one of the core computing technologies today. Inter-VM communication is not only prevalent but also one of the leading costs for data-intensive systems and applications in most data centers and cloud comp
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 719:012008
In order to reduce the subjectivity of information security risk assessment process and improve assessment efficiency, we propose a new method of information security risk assessment based on improved FAHP (Fuzzy Analytic Hierarchy Process) to analys