Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Wei, Xingshen"'
Complex multi-step attacks have caused significant damage to numerous critical infrastructures. To detect such attacks, graph neural network based methods have shown promising results by modeling the system's events as a graph. However, existing meth
Externí odkaz:
http://arxiv.org/abs/2405.11335
Publikováno v:
Frontiers of Information Technology & Electronic Engineering. 22:374-399
Ubiquitous power Internet of Things (IoT) is a smart service system oriented to all aspects of the power system, and has the characteristics of universal interconnection, human-computer interaction, comprehensive state perception, efficient informati
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2021 IEEE 4th International Electrical and Energy Conference (CIEEC).
The network attacks targeted at the Power Monitoring System (PMS) become much more complex and covert. However, traditional security protection methods cannot well detect such unknown attacks or multi-step attacks, which leads to a constant threat. H
Publikováno v:
2021 IEEE 4th International Electrical and Energy Conference (CIEEC).
In recent years, due to the elastic container technical characteristics and active open source community support, container technology has become an important basic technology for the new digital infrastructure of power. Now, the container technology
Publikováno v:
Proceedings of 2020 International Top-Level Forum on Engineering Science and Technology Development Strategy and The 5th PURPLE MOUNTAIN FORUM (PMF2020) ISBN: 9789811597459
In the power system, each province has nearly millions of sensors, and a large amount of data is generated. In the process of multi-sensor data collection, there are many problems such as inaccurate monitoring accuracy, waste of collection nodes, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::02955fd5619c676b54c35107fee34328
https://doi.org/10.1007/978-981-15-9746-6_65
https://doi.org/10.1007/978-981-15-9746-6_65
Publikováno v:
2020 Chinese Automation Congress (CAC).
The architecture of Trusted Computing 3.0 provides an excellent way to enhance the security of industrial control systems (ICS). However, the implementation of this architecture needs to solve some technical issues such as access control and trust qu
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Yan, Yongquan, Wei, Xingshen, Gao, Peng, Xu, Junxian, Zhang, Haotian, Tian, Qiuhan, Ma, Zengzhou
Publikováno v:
Proceedings of SPIE; December 2022, Vol. 12288 Issue: 1 p122881K-122881K-5, 1105935p
Publikováno v:
2019 IEEE International Conference on Energy Internet (ICEI).
The operating system is extremely important for both "Made in China 2025" and ubiquitous electric power Internet of Things. By investigating of five key requirements for ubiquitous electric power Internet of Things at the OS level (performance, ecosy