咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 3 篇 电气工程
    • 3 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 2 篇 石油与天然气工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 9 篇 hacker attacks
  • 2 篇 intrusion detect...
  • 2 篇 computer virus
  • 2 篇 ips
  • 2 篇 e-commerce
  • 2 篇 defense
  • 2 篇 viruses
  • 2 篇 ids
  • 2 篇 campus network
  • 1 篇 ethical hacking
  • 1 篇 cyber security
  • 1 篇 penetration test...
  • 1 篇 trust assessment
  • 1 篇 phishing attacks
  • 1 篇 streams of rando...
  • 1 篇 node certificate
  • 1 篇 virtual leader a...
  • 1 篇 attacked generat...
  • 1 篇 power engineerin...
  • 1 篇 security of data

机构

  • 1 篇 nanjing univ pos...
  • 1 篇 state grid shand...
  • 1 篇 univ telecommun ...
  • 1 篇 liaoning tech un...
  • 1 篇 state grid juxia...
  • 1 篇 univ twente ensc...
  • 1 篇 state grid weiha...
  • 1 篇 interpol detachm...
  • 1 篇 sistemprom conce...
  • 1 篇 jilin business &...
  • 1 篇 nanjing univ pos...
  • 1 篇 state grid shand...
  • 1 篇 nanjing univ pos...

作者

  • 1 篇 wang zongjiang c...
  • 1 篇 wang jing
  • 1 篇 dimitrova mariya...
  • 1 篇 scholten christi...
  • 1 篇 pras aiko
  • 1 篇 zhang yong-ku
  • 1 篇 tulemisov yu. m.
  • 1 篇 sun qiang
  • 1 篇 chen jianfei
  • 1 篇 yue dong
  • 1 篇 ming lu
  • 1 篇 ivanov ivan
  • 1 篇 zhao lina
  • 1 篇 song li-ren
  • 1 篇 lu ming departme...
  • 1 篇 huang chongxin
  • 1 篇 gorshkov a. v.
  • 1 篇 dobrodeev a. yu.
  • 1 篇 santanna jair
  • 1 篇 deng song

语言

  • 8 篇 英文
  • 1 篇 中文
检索条件"主题词=hacker attacks"
9 条 记 录,以下是1-10 订阅
排序:
Security feedback trust model of power network demand response terminal triggered by hacker attacks
收藏 引用
FRONTIERS IN ENERGY RESEARCH 2023年 11卷
作者: Chen, Jianfei Zhao, Lina Sun, Qiang Zhang, Cheng State Grid Shandong Elect Power Co Jinan Peoples R China State Grid Shandong Elect Power Co Informat & Commun Co Jinan Peoples R China State Grid Weihai Wendeng Power Supply Co Weihai Peoples R China State Grid Juxian Power Supply Co Rizhao Peoples R China
With the rapid expansion of power system scale, demand response business is promoted to develop. More and more demand response terminals are connected to the smart grid, smart grid is an intelligent system that allows... 详细信息
来源: 评论
Laboratory Penetration Test Studies  30
Laboratory Penetration Test Studies
收藏 引用
30th National Conference with International Participation (TELECOM)
作者: Ivanov, Ivan Dimitrova, Mariyana Ivanov, Aleksandra Univ Telecommun & Posts Informat Technol Sofia Bulgaria
Penetration testing involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Ethical hacking involves duplicating the strategies and actions of malicious attackers. This p... 详细信息
来源: 评论
Real-time distributed economic dispatch scheme of grid-connected microgrid considering cyberattacks
收藏 引用
IET RENEWABLE POWER GENERATION 2020年 第14期14卷 2750-2758页
作者: Huang, Chongxin Wang, Jing Deng, Song Yue, Dong Nanjing Univ Posts & Telecommun Coll Automat Nanjing 210023 Peoples R China Nanjing Univ Posts & Telecommun Coll Artificial Intelligence Nanjing 210023 Peoples R China Nanjing Univ Posts & Telecommun Inst Adv Technol Nanjing 210023 Peoples R China
Cyber security of microgrids attracts increasing attention since the relatively open communication network of the microgrids is vulnerable to hacker attacks. This study proposes a real-time distributed economic dispat... 详细信息
来源: 评论
MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification
MikroTik Devices Landscape, Realistic Honeypots, and Automat...
收藏 引用
IEEE/IFIP Network Operations and Management Symposium (NOMS)
作者: Ceron, Joao M. Scholten, Christian Pras, Aiko Santanna, Jair Univ Twente Enschede Netherlands
In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malwares e.g., VPN-Filter, Navidade, and SonarDNS). These routers were used, then, for all sort of cybercrimes: from DDoS... 详细信息
来源: 评论
A PROCEDURE FOR ESTIMATING THE STATISTICAL CHARACTERISTICS OF STREAMS OF hacker attacks. THE STRUCTURE AND DETERMINATION OF THEIR FUNDAMENTAL PROPERTIES
收藏 引用
MEASUREMENT TECHNIQUES 2011年 第4期54卷 442-446页
作者: Dobrodeev, A. Yu. Gorshkov, A. V. Tulemisov, Yu. M. Sistemprom Concern Minist Ind & Commerce Russian Federat Moscow Russia
A procedure for estimating the statistical characteristics of ordinary streams of random events is proposed. This procedure was used to investigate the characteristics of hacker phishing attacks in the period from Dec... 详细信息
来源: 评论
Campus Network Security Model Study
Campus Network Security Model Study
收藏 引用
4th International Conference on Machine Vision (ICMV) - Computer Vision and Image Analysis - Pattern Recognition and Basic Technologies
作者: Zhang Yong-ku Song Li-ren Liaoning Tech Univ Sch Elect & Informat Engn Huludao Peoples R China Interpol Detachment Fuxin City Fuxing Peoples R China
Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewal... 详细信息
来源: 评论
A New Type of Intelligent Network Security Model of the Campus Study
A New Type of Intelligent Network Security Model of the Camp...
收藏 引用
2011 3rd International Conference on Computer Research and Development(ICCRD 2011)
作者: Wang Zongjiang Computer and Communication Engineering Weifang University Weifang,China
With the gradual popularization of the Internet, campus network construction has become more sophisticated, to the intelligent *** from that,the campus network security is growing importance,Design a very effective de... 详细信息
来源: 评论
The Application of Intrusion Detection Technology in the E-commerce System
The Application of Intrusion Detection Technology in the E-c...
收藏 引用
2nd IEEE International Conference on Information and Financial Engineering (ICIFE)
作者: Ming, Lu Jilin Business & Technol Coll Dept Informat Engn Changchun Peoples R China
Network security is increasingly severe, more and more variety of hacker attacks, this is extremely dangerous for e-commerce. This article discusses the intrusion detection technology in the concrete application of e-... 详细信息
来源: 评论
The Application of Intrusion Detection Technology in the E-commerce System
The Application of Intrusion Detection Technology in the E-c...
收藏 引用
2010 2nd IEEE International Conference on Information and Financial Engineering(ICIFE2010)
作者: Lu Ming Department of Information Engineering Jilin Business and Technology College Changchun,China
Network security is increasingly severe,more and more variety of hacker attacks,this is extremely dangerous for *** article discusses the intrusion detection technology in the concrete application of e-commerce system... 详细信息
来源: 评论