咨询与建议

限定检索结果

文献类型

  • 144 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 68 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 53 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 12 篇 建筑学
    • 12 篇 土木工程
    • 12 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 石油与天然气工程
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 网络空间安全
    • 3 篇 机械工程
  • 42 篇 理学
    • 22 篇 数学
    • 9 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 4 篇 统计学(可授理学、...
    • 2 篇 地球物理学
    • 2 篇 系统科学
  • 27 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 8 篇 feature extracti...
  • 8 篇 accuracy
  • 7 篇 electric power d...
  • 5 篇 security
  • 5 篇 convolutional ne...
  • 4 篇 internet of thin...
  • 4 篇 power grids
  • 4 篇 power systems
  • 4 篇 anomaly detectio...
  • 4 篇 authentication
  • 4 篇 topology
  • 4 篇 network security
  • 3 篇 deep learning
  • 3 篇 automation
  • 3 篇 computer archite...
  • 3 篇 fingerprint reco...
  • 3 篇 monitoring
  • 3 篇 computational mo...
  • 3 篇 decision making
  • 3 篇 blockchain

机构

  • 32 篇 state grid labor...
  • 23 篇 state grid labor...
  • 18 篇 state grid smart...
  • 15 篇 state grid smart...
  • 12 篇 state grid labor...
  • 10 篇 state grid labor...
  • 10 篇 state grid smart...
  • 9 篇 state grid labor...
  • 8 篇 state grid smart...
  • 6 篇 state grid shand...
  • 6 篇 nantong power su...
  • 5 篇 state grid labor...
  • 5 篇 qingpu power sup...
  • 5 篇 big data center ...
  • 5 篇 state grid smart...
  • 4 篇 qingpu power sup...
  • 4 篇 zhejiang univers...
  • 4 篇 state grid labor...
  • 4 篇 state grid jiang...
  • 4 篇 school of inform...

作者

  • 26 篇 zhou aihua
  • 26 篇 peng lin
  • 24 篇 qiao junfeng
  • 15 篇 yang pei
  • 14 篇 pan sen
  • 12 篇 yu hai
  • 10 篇 wang he
  • 10 篇 aihua zhou
  • 10 篇 ou zhujian
  • 9 篇 xu min
  • 9 篇 chen lu
  • 8 篇 ma yuanyuan
  • 8 篇 chen mu
  • 8 篇 zhang daojuan
  • 8 篇 junfeng qiao
  • 8 篇 he zhimin
  • 7 篇 zhang tao
  • 7 篇 tengyan wang
  • 7 篇 lin peng
  • 7 篇 shen xiaofeng

语言

  • 142 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=State Grid Laboratory of Power Cyber-security Protection and Monitoring Technology"
150 条 记 录,以下是91-100 订阅
排序:
power Internet of Things security Evaluation Method Based on Fuzzy Set Theory  15th
Power Internet of Things Security Evaluation Method Based on...
收藏 引用
15th International Conference on Genetic and Evolutionary Computing, ICGEC 2023
作者: Wang, Yuman Wu, Hongbin Wang, Yilei Wang, Zixiang Zhu, Xinyue Qian, Kexiang SGRI Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. Ltd. Beijing102200 China Internet Technology Center State Grid Zhejiang Electric Power Co. Ltd. Research Institute Hangzhou310000 China School of Computer Science Northeast Electric Power University Jilin Jilin City132012 China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100000 China
Aiming at the problems of high fuzziness and low integrity of the current power Internet of Things network security evaluation index system, the fuzzy set theory is used to evaluate the security issues of power IoT te... 详细信息
来源: 评论
Anomaly Detection Model for Data Interactions Based on Temporal Features in Electric power Data Centers  8
Anomaly Detection Model for Data Interactions Based on Tempo...
收藏 引用
8th International Conference on Communication, Image and Signal Processing, CCISP 2023
作者: Yu, Pengfei Zhou, Xiaoming Chen, Longdan Qi, Jun Bai, Liang State Grid Smart Grid Research Institute Co. LTD State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing China State Grid Liaoning Electric Power Supply Company Limited Liaoning Shenyang China Beijing University Of Posts and Telecommunications Beijing China State Grid Liaoning Electric Power Supply Co. LTD. Information & Telecommunication Branch Liaoning Shenyang China
The current power data centers face the risk of data leakage during the data exchange process. Given the increasing scale and complexity of power data centers, traditional methods for identifying anomalies in the temp... 详细信息
来源: 评论
Automated security Penetration Testing Based on Machine Learning
Automated Security Penetration Testing Based on Machine Lear...
收藏 引用
Electronic Information Engineering and Computer Communication (EIECC), International Conference on
作者: Peng Zhang Wenhui Wang Daojuan Zhang Hongbin Wu Longxi Han Qi Zhao State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China Electric Power Research Institute Co. Ltd. Beijing China
Penetration testing is a crucial measure for preventing cyberspace attacks. Typically, penetration testing is conducted manually, which presents challenges such as reliance on experience, high costs, and low efficienc... 详细信息
来源: 评论
Research on digital modeling technology based on multi-source data of power grid  3
Research on digital modeling technology based on multi-sourc...
收藏 引用
3rd International Conference on Electronics, Electrical and Information Engineering, ICEEIE 2023
作者: He, Zhimin Yu, Hai Qiao, Junfeng Peng, Lin Wang, He Shen, Lianteng Li, Zhe Du, Xiaodong State Grid Smart Grid Research Institute Co. LTD Jiangsu Nanjing210003 China State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Jiangsu Nanjing210003 China China Electric Power Research Institute Beijing100000 China State Grid Hebei Electric Power Co. Ltd. Electric Power Science Research Institute Hebei Shijiazhuang050000 China
In this paper, the digital modeling technology based on multi-source data of power grid is studied. First, the theoretical system of power grid digital twin model is established to provide theoretical reference for th... 详细信息
来源: 评论
Anomaly Detection of Terminal access based on LSTM and ResNet  2
Anomaly Detection of Terminal access based on LSTM and ResNe...
收藏 引用
2nd International Symposium on Computer Applications and Information Systems, ISCAIS 2023
作者: Li, Nige Li, Yong Lu, Ziang Li, Duanchao Ding, Jinjin State Grid Smart Grid Research Institute Co. Ltd. 8 Nanrui Road Jiangsu Nanjing210003 China State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology 8 Nanrui Road Jiangsu Nanjing210003 China State Grid Anhui Electric Power Co. LTD. 9 Huangshan Road Anhui Hefei230022 China
Massive wireless debugging terminals and complex and diverse access requirements pose significant challenges to the secure access of substation terminal equipment. It is crucial to detect anomaly network traffic to en... 详细信息
来源: 评论
Evolution and Challenges of the New-Type power System: Transformation under the Carbon Neutrality Goal
Evolution and Challenges of the New-Type Power System: Trans...
收藏 引用
Advanced Control Systems and Automation Technologies (ACSAT), International Conference on
作者: Tengyan Wang Nige Li Lu Chen Mu Chen Nanjing Branch of China Electric Power Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing China
Amid the severe backdrop of global climate change, achieving carbon peaking and neutrality has emerged as a universal consensus and the cornerstone of energy policies worldwide. As the largest energy consumer and carb... 详细信息
来源: 评论
Design and Implementation of Identity Authentication Architecture System Fusing Hardware and Software Features
Design and Implementation of Identity Authentication Archite...
收藏 引用
Electronic technology and Information Science (ICETIS), International Conference on
作者: Ziang Lu Tengyan Wang Xin Liu Nige Li State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd Nanjing China State Grid Shandong Electric Power Research Institute Jinan China
Distributed resource access in the new power system will also occur in large-scale growth, due to the variety, large-scale, and in a complex open physical environment, in the relatively weak security protection measur... 详细信息
来源: 评论
Dynamic access control model based on attribute reachability  5
Dynamic access control model based on attribute reachability
收藏 引用
5th International Conference on Artificial Intelligence and Computer Science, AICS 2023
作者: Luo, Chen Yu, Pengfei Wei, Sijia Zhou, Xiaoming Qi, Jun Zhang, Wenjie State Grid Smart Grid Research Institute Co. Ltd. Jiangsu Nanjing210003 China State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Jiangsu Nanjing210003 China State Grid Liaoning Electric Power Supply Co. Ltd. Information & Telecommunication Branch Liaoning Shenyang110006 China State Grid Liaoning Electric Power Supply Company Limited Liaoning Shenyang110006 China
Attribute-based access control models are widely used in permission management for resource access. By mining access control lists of policies, it can significantly reduce the cost of policy management and streamline ... 详细信息
来源: 评论
Deep Integration and Learning of Measurement Data in Active Distribution power Networks for Load Flow Estimation Considering Incomplete Information  6
Deep Integration and Learning of Measurement Data in Active ...
收藏 引用
6th IEEE International Electrical and Energy Conference, CIEEC 2023
作者: Diao, Ruisheng Zhou, Aihua Zeng, Ruiyuan Wang, Anqi Shen, Xiaofeng Shun, Jingde Gu, Hua ZJU-UIUC Institute Zhejiang University State Key Laboratory of Clean Energy Utilization Zhejiang Haining314400 China State Grid Smart Grid Research Institute Co. LTD. State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Jiangsu Nanjing210003 China ZJU-UIUC Institute Zhejiang University Haining China Qingpu Power Supply Company Stage Grid Shanghai Municipal Electric Power Company Shanghai201799 China
To reach the goals of carbon peaking by 2030 and carbon neutrality by 2060 in China, a growing penetration of PV generation is integrated into the modern distribution power grid, causing challenges in operating the gr... 详细信息
来源: 评论
A Semi-Supervised Clustering-Based Approach for Sensing and Classifying Unknown Attacks in power Systems
A Semi-Supervised Clustering-Based Approach for Sensing and ...
收藏 引用
Artificial Intelligence technology (ACAIT), Asian Conference on
作者: Yong Li Zhipeng Shao Tao Zhang Yuanyuan Ma State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Enstitute Co. Ltd Nanjing China
To solve the problem of perceiving and classifying unknown attacks in power systems, the study proposes a method for perceiving and classifying unknown attacks in power systems based on semi-supervised clustering. The... 详细信息
来源: 评论