Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Suo Siliang"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2021 China International Conference on Electricity Distribution (CICED).
This paper conducts analysis on latency performance of power distribution control services over security protected wireless communication channel. An end-to-end power distribution control service flow is developed on a hardware-in-the-loop evaluation
Publikováno v:
2021 China International Conference on Electricity Distribution (CICED).
Massive amount of remote wireless communication devices have been deployed in power grid to transmit data of different services between terminals and service stations using wireless technologies including GPRS/LTE. While these terminals facilitate th
Publikováno v:
2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE).
At present, the security protection of distribution automation system is faced with complex and diverse operating environment, and the main use of public network may bring greater security risks, there are still some deficiencies. According to the ac
Publikováno v:
2021 IEEE International Conference on Consumer Electronics and Computer Engineering (ICCECE).
The security protection function of the existing power distribution terminals is mainly achieved by external encryption devices. Aiming at the serial port problems of large transmission delay and low transmission speed, which is between power distrib
Publikováno v:
CBD
Network intrusion detection system (NIDS) plays an important role in network security. It can detect the malicious traffic and prevent the network intrusion. Traditional methods used machine learning techniques such as support vector machine, Bayesia
Publikováno v:
SmartBlock
With the deep integration of industrialization and informatization, the network environment is becoming more and more complex, and security is facing a huge threat. Recently, the industrial control systems pose an open trend, so the strategy of preve
Publikováno v:
Algorithms and Architectures for Parallel Processing ISBN: 9783030602475
ICA3PP (3)
ICA3PP (3)
The proliferation of malware and its variants have brought great challenges to malware detection. The traditional static analysis methods are complicated and consume a lot of human resource. Moreover, most of the current detection methods mainly focu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dd36708b25204355f06eddaeecbeff97
https://doi.org/10.1007/978-3-030-60248-2_47
https://doi.org/10.1007/978-3-030-60248-2_47
Publikováno v:
2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC).
The structure design scheme of two-chip stack, chip and device is adopted in this design, and the main control chip, the safety chip and several kinds of passive components are designed and assembled on the multi-layer substrate by using the SiP pack
Publikováno v:
2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
The target of security protection of the power distribution automation system (the distribution system for short) is to ensure the security of communication between the distribution terminal (terminal for short) and the distribution master station (m