咨询与建议

限定检索结果

文献类型

  • 144 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 68 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 53 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 12 篇 建筑学
    • 12 篇 土木工程
    • 12 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 石油与天然气工程
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 网络空间安全
    • 3 篇 机械工程
  • 42 篇 理学
    • 22 篇 数学
    • 9 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 4 篇 统计学(可授理学、...
    • 2 篇 地球物理学
    • 2 篇 系统科学
  • 27 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 8 篇 feature extracti...
  • 8 篇 accuracy
  • 7 篇 electric power d...
  • 5 篇 security
  • 5 篇 convolutional ne...
  • 4 篇 internet of thin...
  • 4 篇 power grids
  • 4 篇 power systems
  • 4 篇 anomaly detectio...
  • 4 篇 authentication
  • 4 篇 topology
  • 4 篇 network security
  • 3 篇 deep learning
  • 3 篇 automation
  • 3 篇 computer archite...
  • 3 篇 fingerprint reco...
  • 3 篇 monitoring
  • 3 篇 computational mo...
  • 3 篇 decision making
  • 3 篇 blockchain

机构

  • 32 篇 state grid labor...
  • 23 篇 state grid labor...
  • 18 篇 state grid smart...
  • 15 篇 state grid smart...
  • 12 篇 state grid labor...
  • 10 篇 state grid labor...
  • 10 篇 state grid smart...
  • 9 篇 state grid labor...
  • 8 篇 state grid smart...
  • 6 篇 state grid shand...
  • 6 篇 nantong power su...
  • 5 篇 state grid labor...
  • 5 篇 qingpu power sup...
  • 5 篇 big data center ...
  • 5 篇 state grid smart...
  • 4 篇 qingpu power sup...
  • 4 篇 zhejiang univers...
  • 4 篇 state grid labor...
  • 4 篇 state grid jiang...
  • 4 篇 school of inform...

作者

  • 26 篇 zhou aihua
  • 26 篇 peng lin
  • 24 篇 qiao junfeng
  • 15 篇 yang pei
  • 14 篇 pan sen
  • 12 篇 yu hai
  • 10 篇 wang he
  • 10 篇 aihua zhou
  • 10 篇 ou zhujian
  • 9 篇 xu min
  • 9 篇 chen lu
  • 8 篇 ma yuanyuan
  • 8 篇 chen mu
  • 8 篇 zhang daojuan
  • 8 篇 junfeng qiao
  • 8 篇 he zhimin
  • 7 篇 zhang tao
  • 7 篇 tengyan wang
  • 7 篇 lin peng
  • 7 篇 shen xiaofeng

语言

  • 142 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology"
150 条 记 录,以下是11-20 订阅
排序:
User Identification based on Behavior Feature Analysis  7
User Identification based on Behavior Feature Analysis
收藏 引用
7th International Conference on Electrical, Mechanical and Computer Engineering, ICEMCE 2023
作者: Dai, Yuwen Zhang, Peng Wu, Tianqi Wu, Hongbin Zhang, Daojuan Lv, Zhuo Chen, Cen State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Beijing China State Grid Henan Electric Power Research Institute State Grid Laboratory of Power Monitoring System Cyber Security Technical Standard Verification Beijing China
The issue of identity management and information security in cyberspace is becoming increasingly important, and the issue of how to effectively identify through user behavior urgently needs to be addressed. At present... 详细信息
来源: 评论
Evolution and Challenges of the New-Type power System: Transformation under the Carbon Neutrality Goal
Evolution and Challenges of the New-Type Power System: Trans...
收藏 引用
2024 International Conference on Advanced Control Systems and Automation Technologies, ACSAT 2024
作者: Wang, Tengyan Li, Nige Chen, Lu Chen, Mu State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing Branch of China Electric Power Research Institute Co. Ltd. Nanjing China
Amid the severe backdrop of global climate change, achieving carbon peaking and neutrality has emerged as a universal consensus and the cornerstone of energy policies worldwide. As the largest energy consumer and carb... 详细信息
来源: 评论
A 5G Slice Traffic Anomaly Detection Method Based on Convolution Neural Network  8
A 5G Slice Traffic Anomaly Detection Method Based on Convolu...
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Lu, Chen Tao, Zhang Yuanyuan, Ma State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing210003 China
As the network security threats caused by the Internet of Things (IoT) continue to increase, the attack surface continues to expand and the network heterogeneity increases, and the use of virtualization technology and... 详细信息
来源: 评论
A Semi-Supervised Clustering-Based Approach for Sensing and Classifying Unknown Attacks in power Systems  7
A Semi-Supervised Clustering-Based Approach for Sensing and ...
收藏 引用
7th Asian Conference on Artificial Intelligence technology, ACAIT 2023
作者: Li, Yong Shao, Zhipeng Zhang, Tao Ma, Yuanyuan State Grid Smart Grid Research Enstitute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection And Monitoring Technology Jiangsu Nanjing China
To solve the problem of perceiving and classifying unknown attacks in power systems, the study proposes a method for perceiving and classifying unknown attacks in power systems based on semi-supervised clustering. The... 详细信息
来源: 评论
Semi-supervised power Microservices Log Anomaly Detection Based on BiLSTM and BERT with Attention  2
Semi-supervised Power Microservices Log Anomaly Detection Ba...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Zaojian, Dai Yong, Li Mu, Chen Liang, Chen Wengao, Fang Ziang, Lu State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China
The software industry has seen a rise in the size and intricacy of software in recent years, leading to a growing concern about how to accurately identify, analyze, and pinpoint abnormal behavior that may occur during... 详细信息
来源: 评论
An instruction level attack detection method for new power load system based on LSTM
An instruction level attack detection method for new power l...
收藏 引用
2024 International Conference on Smart grid and Artificial Intelligence, SGAI 2024
作者: Yao, Qigui Zhang, Xiaojian Fei, Jiaxuan Yao, Minglu Li, Ye State Grid Smart Grid Research Institute Co. Ltd. Nanjing210003 China State Grid Laboratory of Power Cyber-security Protection and Monitoring Technology China State Grid Tianjin Electric Power Company Tianjin300384 China
To realize the efficient instruction level attack detection of the new power load resource management system under the load resource coordination and control interactive service scenario, this article proposes a novel... 详细信息
来源: 评论
Microservice Anomaly monitoring Method based on Multi-dimensional Spatiotemporal Feature Reconstruction  4
Microservice Anomaly Monitoring Method based on Multi-dimens...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zeng, Jing Lai, Ji Li, Shuo Li, Xian Yang, Ruxia Information Communication Branch State Grid Jibei Electric Power Co. Ltd Beijing China State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology China Electric Power Research Institute Nanjing China
In a modern microservice architecture, the large-scale distribution of services and high concurrency access make anomaly monitoring particularly complex. Traditional monitoring methods usually rely on a single data di... 详细信息
来源: 评论
A New Way of (Decentralized) Identity Authentication and Continuous Authentication Following X3DH Framework
A New Way of (Decentralized) Identity Authentication and Con...
收藏 引用
2024 International Conference Optoelectronic Information and Optical Engineering, OIOE 2024
作者: Zhao, Yufei Wang, Xinzhe Zhang, Daojuan Wu, Tianqi Gao, Lifang Chen, Ling State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China Electric Power Research Institute Co. Ltd. Beijing China State Grid Hebei Information and Telecommunication Branch Hebei China School of Cyber Science and Engineering Sichuan University Chengdu China
Authentication and key establishment are fundamental goals of modern cryptography. There are plenty of works that focus on secure and efficient design of them. Among them, the Diffie-Hellman key agreement protocol is ... 详细信息
来源: 评论
Research on power System cyber security Defense based on ATT&CK Framework  3
Research on Power System Cyber Security Defense based on ATT...
收藏 引用
3rd International Conference on Energy Engineering and power Systems, EEPS 2023
作者: Wang, Tengyan Ma, Yuanyuan Shao, Zhipeng Xu, Zheng State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing China State Grid Shandong Electric Power Company Jinan China
Advanced persistent threat (APT) attack is one of the most serious threats to power system cyber security. ATT&CK framework integrates the known historical and practical APT attack tactics and techniques to form a... 详细信息
来源: 评论
Containerization of the security Application on Electric power IoT Terminal  4
Containerization of the Security Application on Electric Pow...
收藏 引用
4th International Conference on Information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Wang, Tengyan Shao, Zhipeng Li, Nige Xu, Zheng State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing China State Grid Shandong Electric Power Company Jinan China
The development of Internet of Things (IoT) technology brings convenience to the development of the electric power business but also brings security risks. Moreover, owing to the massive heterogeneity of IoT terminals... 详细信息
来源: 评论