The choice of courses is crucial to a student's career achievement. Different courses offered by various academic institutions need the students to browse the course outline in the current educational environment ...
详细信息
Distribution Internet of Things is the embodiment of the application of power Internet of things in the field of distribution. This paper proposes a distribution Internet of Things architecture that combines data fusi...
详细信息
Network security is a growing concern as digital infrastructure expands, and traditional measures struggle against modern cyber threats. With the increasing complexity of attacks, there is a need for more adaptive and...
详细信息
This study provides an outline of Distribution System State Estimation (DSSE), a technique introduced by Fred Schweppes in 1970. Since then, SE has been crucial in managing and controlling electric transmission operat...
详细信息
For anomaly-based intrusion detection in computer networks, data cubes can be used for building a model of the normal behavior of each cell. During inference an anomaly score is calculated based on the deviation of ce...
详细信息
ISBN:
(纸本)9781665426053
For anomaly-based intrusion detection in computer networks, data cubes can be used for building a model of the normal behavior of each cell. During inference an anomaly score is calculated based on the deviation of cell metrics from the corresponding normality model. A visualization approach is shown that combines different types of diagrams and charts with linked user interaction for filtering of data.
The integration of Internet of Things (IoT) technology into smart home systems has revolutionized patient monitoring by providing real-time health insights and automated environmental adjustments. This study focuses o...
详细信息
With the rapid development of Internet of Things technology, people can integrate the Internet of Things in more and more work scenarios, making work simpler and more intelligent. For wind power generation technology,...
详细信息
In smart power transmission grids, the existing energy management systems (EMSes) unprecedentedly faces the stealthy false data injection attack (SFDI), where an adversary aims to compromise the optimal power flow ana...
详细信息
The increasing variety of multimedia data types, such as text, images, and audio, has necessitated advanceddata encryption techniques to ensure secure transmission and storage. Traditional encryption methods, includi...
详细信息
In this paper, a set of intelligent detection system for complex network intrusion data is designed. The system stores complex network traffic that is difficult to determine to the Hadoop data warehouse of the distrib...
详细信息
暂无评论