咨询与建议

限定检索结果

文献类型

  • 144 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 68 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 53 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 12 篇 建筑学
    • 12 篇 土木工程
    • 12 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 石油与天然气工程
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 网络空间安全
    • 3 篇 机械工程
  • 42 篇 理学
    • 22 篇 数学
    • 9 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 4 篇 统计学(可授理学、...
    • 2 篇 地球物理学
    • 2 篇 系统科学
  • 27 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 8 篇 feature extracti...
  • 8 篇 accuracy
  • 7 篇 electric power d...
  • 5 篇 security
  • 5 篇 convolutional ne...
  • 4 篇 internet of thin...
  • 4 篇 power grids
  • 4 篇 power systems
  • 4 篇 anomaly detectio...
  • 4 篇 authentication
  • 4 篇 topology
  • 4 篇 network security
  • 3 篇 deep learning
  • 3 篇 automation
  • 3 篇 computer archite...
  • 3 篇 fingerprint reco...
  • 3 篇 monitoring
  • 3 篇 computational mo...
  • 3 篇 decision making
  • 3 篇 blockchain

机构

  • 32 篇 state grid labor...
  • 23 篇 state grid labor...
  • 18 篇 state grid smart...
  • 15 篇 state grid smart...
  • 12 篇 state grid labor...
  • 10 篇 state grid labor...
  • 10 篇 state grid smart...
  • 9 篇 state grid labor...
  • 8 篇 state grid smart...
  • 6 篇 state grid shand...
  • 6 篇 nantong power su...
  • 5 篇 state grid labor...
  • 5 篇 qingpu power sup...
  • 5 篇 big data center ...
  • 5 篇 state grid smart...
  • 4 篇 qingpu power sup...
  • 4 篇 zhejiang univers...
  • 4 篇 state grid labor...
  • 4 篇 state grid jiang...
  • 4 篇 school of inform...

作者

  • 26 篇 zhou aihua
  • 26 篇 peng lin
  • 24 篇 qiao junfeng
  • 15 篇 yang pei
  • 14 篇 pan sen
  • 12 篇 yu hai
  • 10 篇 wang he
  • 10 篇 aihua zhou
  • 10 篇 ou zhujian
  • 9 篇 xu min
  • 9 篇 chen lu
  • 8 篇 ma yuanyuan
  • 8 篇 chen mu
  • 8 篇 zhang daojuan
  • 8 篇 junfeng qiao
  • 8 篇 he zhimin
  • 7 篇 zhang tao
  • 7 篇 tengyan wang
  • 7 篇 lin peng
  • 7 篇 shen xiaofeng

语言

  • 142 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology"
150 条 记 录,以下是121-130 订阅
排序:
Research and Application of Electronic Data Retrieval in Material Supply Chain Enhanced by Large Language Models and Knowledge Graph
Research and Application of Electronic Data Retrieval in Mat...
收藏 引用
Information technology, Communication Ecosystem and Management (ITCEM), International Conference on
作者: Xing Ge Yafei Liu Pei Yang Xin Sun Junfeng Qiao Luyao Qu Jingyi Qiu State Grid Jiangsu Electric Power CO. LTD. Material Branch Nanjing China State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology & China Electric Power Research Institute Beijing China
In response to the new goals of building green and modern smart supply chains, the electric power equipment supply chain is experiencing a shift toward digital intelligence and low-carbon, environmentally friendly dev... 详细信息
来源: 评论
Research and Application of Distribution Network Planning Based on Digital Twinning technology
Research and Application of Distribution Network Planning Ba...
收藏 引用
Decision Science & Management (ICDSM), International Conference on
作者: Junfeng Qiao Lin Peng Aihua Zhou Zhujian Ou Xiaoyi Xu Fuyun Zhu State Grid Laboratory of Power Cyber-Security Protection & Monitoring Technology State Grid Smart Grid Research Institute Co. LTD Nanjing China Nantong Power Supply Company State Grid Jiangsu Electric Power Co. LTD Nanjing China
To satisfy the requirement of electric distribution grid planning brought by the forward annual electricity consumption growth and power grid expand, to determine where, when, and which type of substations, lines or d...
来源: 评论
Research and Implementation of Multi Fusion Data Model Construction technology for Distribution Network Digital Twins
Research and Implementation of Multi Fusion Data Model Const...
收藏 引用
Decision Science & Management (ICDSM), International Conference on
作者: Junfeng Qiao Lin Peng Aihua Zhou Zhujian Ou Yanfang Mao Sen Pan State Grid Laboratory of Power Cyber-Security Protection & Monitoring Technology State Grid Smart Grid Research Institute Co. LTD Nanjing China Nantong Power Supply Company State Grid Jiangsu Electric Power Co. LTD Nanjing China
The core of digital twin is the digital reconstruction of physical space, that is the physical space perception and processed data are applied to the virtual space to achieve real-time mapping of physical space throug...
来源: 评论
Microservice Anomaly monitoring Method based on Multi-dimensional Spatiotemporal Feature Reconstruction
Microservice Anomaly Monitoring Method based on Multi-dimens...
收藏 引用
Artificial Intelligence and Intelligent Manufacturing (AIIM), International Symposium on
作者: Jing Zeng Ji Lai Shuo Li Xian Li Ruxia Yang Information Communication Branch State Grid Jibei Electric Power Co. Ltd. Beijing China State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology China Electric Power Research Institute Nanjing China
In a modern microservice architecture, the largescale distribution of services and high concurrency access make anomaly monitoring particularly complex. Traditional monitoring methods usually rely on a single data dim... 详细信息
来源: 评论
Device Identification based on Network Traffic Fingerprint
Device Identification based on Network Traffic Fingerprint
收藏 引用
Artificial Intelligence and Intelligent Information Processing (AIIIP), International Conference on
作者: Tianqi Wu Xiaoming Zhou Hongbin Wu Daojuan Zhang Yingjie Zhang Xiao Han State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute co. Ltd Beijing China Operations Safety and Technology Department State Grid Liaoning Electric Power Supply Co. Ltd. Liaoning China
The devices connected to the LAN have the security risk of being counterfeited and remotely controlled. To identify and understand the devices in the network in advance, the administrator can monitor and handle the ab...
来源: 评论
Research and Implementation of Spatial Layout Algorithm and Optimization technology for Digital Twin Objects of Distribution Network Facilities
Research and Implementation of Spatial Layout Algorithm and ...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Junfeng Qiao Lin Peng Aihua Zhou Zhujian Ou Xiaoyi Xu Jianguang Yao State Grid Laboratory of Power cyber-Security Protection & Monitoring Technology State Grid Smart Grid Research Institute Co. LTD Nanjing Jiangsu China Nantong Power Supply Company State Grid Jiangsu Electric Power Co. LTD Nanjing Jiangsu China
The equipment and facilities in the distribution network include not only primary equipment such as transformers, circuit breakers, lightning arr-esters, capacitors, but also secondary equipment such as transfer switc...
来源: 评论
Design of a Data Provenance Scheme with Virtual Tuple-Based Database Watermarking
Design of a Data Provenance Scheme with Virtual Tuple-Based ...
收藏 引用
Chinese Automation Congress (CAC)
作者: Qi Wang Aihua Zhou Yiqing Wang Zhen Zheng Jing Jiang Ruxia Yang State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute co. LTD Nanjing China State Grid XuZhou Power Supply Company Xuzhou China Qingpu Power Supply Company State Grid Shanghai Municipal Electric Power Company Shanghai China
The security of power grid is closely related to national security and social stability. With the development of smart grid and big data, grid data security has ushered in new challenges. The data provenance is one of...
来源: 评论
A comprehensive assessment method for the power structured data classification and grading based on hierarchical analysis
A comprehensive assessment method for the power structured d...
收藏 引用
International Conference on Communications, Information System and Computer Engineering (CISCE)
作者: Yujia Zhai Xiuli Huang Congcong Shi Shenglong Liu Hao Zhang State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. LTD Nanjing China Big Data Center of State Grid Corporation of China Beijing China State Grid Shandong Electric Power Company Jinan China
With the transformation of the digital development of power grids, the classification and grading of structured data for electricity is an important basis for data security protection. Existing methods for assessing d...
来源: 评论
Attack-Aware Capability Assessment Method Based on Specific Semantic Search
Attack-Aware Capability Assessment Method Based on Specific ...
收藏 引用
International Conference on Electronic Engineering and Informatics (EEI)
作者: Daojuan Zhang Qi Zhao Yuman Wang Shu Li Zheng Tian Yizhen Sun State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute co. Ltd Beijing China Hunan Provincial Key Laboratory of Internet of Things in Electricity State Grid information & Communication Company of Hunan Electric Power Corporation Changsha China
In this paper, we propose an attack perception capability assessment method based on the specific semantic search for the problem of attack perception capability assessment of security protection equipment for power m... 详细信息
来源: 评论
Research on Secure Data Circulation and Sharing protection technology Framework for power monitoring System
Research on Secure Data Circulation and Sharing Protection T...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Weicong Huang Jieying Zhou Minghui Jin Zheng Han Sijia Wei State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. LTD. Nanjing China National Power Dispatching and Control Center State Grid Corporation of China Beijing China State Grid Shanghai Municipal Electric Power Company Shanghai China
With the increasing frequency of data circulation and sharing in power monitoring systems, traditional network-centric protection strategies are insufficient to resist the growing risk of data leakage. This article an...
来源: 评论