咨询与建议

限定检索结果

文献类型

  • 6 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 理学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 1 篇 deep learning
  • 1 篇 sequence constru...
  • 1 篇 graphic methods
  • 1 篇 attack investiga...
  • 1 篇 machine learning

机构

  • 4 篇 state grid labor...
  • 4 篇 state grid smart...
  • 4 篇 state grid henan...
  • 3 篇 state grid corpo...
  • 3 篇 state grid henan...
  • 3 篇 school of inform...
  • 3 篇 sgri power grid ...
  • 1 篇 state grid smart...
  • 1 篇 state grid henan...
  • 1 篇 state grid labor...
  • 1 篇 state grid labor...
  • 1 篇 state grid labor...

作者

  • 3 篇 wu tianqi
  • 3 篇 tianqi wu
  • 2 篇 cen chen
  • 2 篇 zhang daojuan
  • 2 篇 zhuo lv
  • 2 篇 wang ming
  • 2 篇 kexiang qian
  • 2 篇 lv zhuo
  • 2 篇 chen cen
  • 2 篇 ming wang
  • 2 篇 qian kexiang
  • 2 篇 daojuan zhang
  • 1 篇 yuwen dai
  • 1 篇 wang yuman
  • 1 篇 zhang peng
  • 1 篇 dai yuwen
  • 1 篇 peng zhang
  • 1 篇 yuman wang
  • 1 篇 wu hongbin
  • 1 篇 hongbin wu

语言

  • 6 篇 英文
检索条件"机构=State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification"
6 条 记 录,以下是1-10 订阅
排序:
User Identification based on Behavior Feature Analysis  7
User Identification based on Behavior Feature Analysis
收藏 引用
7th International Conference on Electrical, Mechanical and Computer Engineering, ICEMCE 2023
作者: Dai, Yuwen Zhang, Peng Wu, Tianqi Wu, Hongbin Zhang, Daojuan Lv, Zhuo Chen, Cen State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Beijing China State Grid Henan Electric Power Research Institute State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification Beijing China
The issue of identity management and information security in cyberspace is becoming increasingly important, and the issue of how to effectively identify through user behavior urgently needs to be addressed. At present... 详细信息
来源: 评论
APT Attack Investigation via Fine-grained Sequence Construction and Learning  3
APT Attack Investigation via Fine-grained Sequence Construct...
收藏 引用
3rd International Symposium on Computer Technology and Information Science, ISCTIS 2023
作者: Wu, Tianqi Lv, Zhuo Zhang, Daojuan Qian, Kexiang Wang, Ming State Grid Smart Grid Research Institute Co. Ltd China State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Sgri Power Grid Digitizing Technology Department State Grid Henan Electric Power Research Institute State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification
APT attack investigation aims to provide the security investigators a causal subgraph of the whole causal graph, so that they can easily analyze attacks. However, existing methods either output subgraphs that miss cri... 详细信息
来源: 评论
Detecting Anomalous Behaviours Based on system Logs: A Dynamic Graph Perspective  8
Detecting Anomalous Behaviours Based on System Logs: A Dynam...
收藏 引用
8th International Conference on Intelligent Computing and Signal Processing, ICSP 2023
作者: Wang, Ming Wang, Yuman Wu, Tianqi Chen, Cen Qian, Kexiang State Grid Corporation of China Co. Ltd Beijing China State Grid Smart Grid Research Institute Co. Ltd China Sgri Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China State Grid Henan Electric Power Company China State Grid Henan Electric Power Research Institute China State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification China School of Information and Communication Engineering Beijing University of Posts and Telecommunications China
system logs provide rich information about the current system's state. To make use of system logs, various existing work extracts a causal graph from the log events, and then applies graph-based machine learning a... 详细信息
来源: 评论
User Identification based on Behavior Feature Analysis
User Identification based on Behavior Feature Analysis
收藏 引用
2023 7th International Conference on Electrical, Mechanical and Computer Engineering (ICEMCE)
作者: Yuwen Dai Peng Zhang Tianqi Wu Hongbin Wu Daojuan Zhang Zhuo Lv Cen Chen State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute co. Ltd Beijing China State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification State Grid Henan Electric Power Research Institute Beijing China
The issue of identity management and information security in cyberspace is becoming increasingly important, and the issue of how to effectively identify through user behavior urgently needs to be addressed. At present...
来源: 评论
Detecting Anomalous Behaviours Based on system Logs: A Dynamic Graph Perspective
Detecting Anomalous Behaviours Based on System Logs: A Dynam...
收藏 引用
6th International Conference on Intelligent Computing and Signal Processing (ICSP)
作者: Ming Wang Yuman Wang Tianqi Wu Cen Chen Kexiang Qian State Grid Corporation of China co. Ltd Beijing China State Grid Smart Grid Research Institute co. Ltd SGRI Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Henan Electric Power Company State Grid Henan Electric Power Research Institute State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification School of Information and Communication Engineering Beijing University of Posts and Telecommunications
system logs provide rich information about the current system’s state. To make use of system logs, various existing work extracts a causal graph from the log events, and then applies graph-based machine learning algo...
来源: 评论
APT Attack Investigation via Fine-grained Sequence Construction and Learning
APT Attack Investigation via Fine-grained Sequence Construct...
收藏 引用
Computer Technology and Information Science (ISCTIS), International Symposium on
作者: Tianqi Wu Zhuo Lv Daojuan Zhang Kexiang Qian Ming Wang State Grid Smart Grid Research Institute co. Ltd SGRI Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Henan Electric Power Company State Grid Henan Electric Power Research Institute State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification School of Information and Communication Engineering Beijing University of Posts and Telecommunications State Grid Corporation of China co. Ltd Beijing China
APT attack investigation aims to provide the security investigators a causal subgraph of the whole causal graph, so that they can easily analyze attacks. However, existing methods either output subgraphs that miss cri...
来源: 评论