咨询与建议

限定检索结果

文献类型

  • 144 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 68 篇 计算机科学与技术...
    • 54 篇 软件工程
    • 53 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 控制科学与工程
    • 13 篇 信息与通信工程
    • 12 篇 建筑学
    • 12 篇 土木工程
    • 12 篇 安全科学与工程
    • 9 篇 动力工程及工程热...
    • 8 篇 生物工程
    • 6 篇 石油与天然气工程
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
    • 4 篇 化学工程与技术
    • 4 篇 网络空间安全
    • 3 篇 机械工程
  • 42 篇 理学
    • 22 篇 数学
    • 9 篇 生物学
    • 8 篇 物理学
    • 6 篇 化学
    • 4 篇 统计学(可授理学、...
    • 2 篇 地球物理学
    • 2 篇 系统科学
  • 27 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 8 篇 feature extracti...
  • 8 篇 accuracy
  • 7 篇 electric power d...
  • 5 篇 security
  • 5 篇 convolutional ne...
  • 4 篇 internet of thin...
  • 4 篇 power grids
  • 4 篇 power systems
  • 4 篇 anomaly detectio...
  • 4 篇 authentication
  • 4 篇 topology
  • 4 篇 network security
  • 3 篇 deep learning
  • 3 篇 automation
  • 3 篇 computer archite...
  • 3 篇 fingerprint reco...
  • 3 篇 monitoring
  • 3 篇 computational mo...
  • 3 篇 decision making
  • 3 篇 blockchain

机构

  • 32 篇 state grid labor...
  • 23 篇 state grid labor...
  • 18 篇 state grid smart...
  • 15 篇 state grid smart...
  • 12 篇 state grid labor...
  • 10 篇 state grid labor...
  • 10 篇 state grid smart...
  • 9 篇 state grid labor...
  • 8 篇 state grid smart...
  • 6 篇 state grid shand...
  • 6 篇 nantong power su...
  • 5 篇 state grid labor...
  • 5 篇 qingpu power sup...
  • 5 篇 big data center ...
  • 5 篇 state grid smart...
  • 4 篇 qingpu power sup...
  • 4 篇 zhejiang univers...
  • 4 篇 state grid labor...
  • 4 篇 state grid jiang...
  • 4 篇 school of inform...

作者

  • 26 篇 zhou aihua
  • 26 篇 peng lin
  • 24 篇 qiao junfeng
  • 15 篇 yang pei
  • 14 篇 pan sen
  • 12 篇 yu hai
  • 10 篇 wang he
  • 10 篇 aihua zhou
  • 10 篇 ou zhujian
  • 9 篇 xu min
  • 9 篇 chen lu
  • 8 篇 ma yuanyuan
  • 8 篇 chen mu
  • 8 篇 zhang daojuan
  • 8 篇 junfeng qiao
  • 8 篇 he zhimin
  • 7 篇 zhang tao
  • 7 篇 tengyan wang
  • 7 篇 lin peng
  • 7 篇 shen xiaofeng

语言

  • 142 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology"
150 条 记 录,以下是21-30 订阅
排序:
A Physical Fingerprint-Based Intrusion Detection and Localization in Fieldbus Network  4
A Physical Fingerprint-Based Intrusion Detection and Localiz...
收藏 引用
4th International Seminar on Artificial Intelligence, Networking and Information technology, AINIT 2023
作者: Qiu, Shenjian Fei, Jiaxuan Yang, Hao Xiao, Yongcai Zhang, Xiaojian State Grid Smart Grid Research Institute Co LTD State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing China State Grid Jiangxi Electric Power Research Institute Nanchang China
The security of fieldbus networks is of utmost importance for industrial control systems. Within fieldbus networks, masquerade attacks and illegal device intrusions are two prevalent forms of attacks. The detection of... 详细信息
来源: 评论
power Terminal Identity Authentication Scheme for Disaster Recovery Environment  3
Power Terminal Identity Authentication Scheme for Disaster R...
收藏 引用
3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum, AIBDF 2023
作者: Chen, Lu Ma, Yuanyuan Zhang, Tao State Grid Smart Grid Research Institute Co. Ltd Nanjing210003 China State Grid Laboratory of Power cyber-Security Protection and Monitoring Technology Nanjing210003 China
In order to ensure the trusted access of power collection terminals in a disaster recovery environment, this paper proposes a cross-domain authentication scheme based on blockchain. Firstly, an improved PBFT algorithm... 详细信息
来源: 评论
Enhancing Cross-Domain Access Efficiency in Zero-Trust Scenarios Oriented to the Access Process
Enhancing Cross-Domain Access Efficiency in Zero-Trust Scena...
收藏 引用
2025 International Conference on Electrical Automation and Artificial Intelligence, ICEAAI 2025
作者: Li, Xian Zhang, Shijun Zeng, Jing Li, Shuo Yang, Ruxia State Grid Jibei Information & Telecommunication Company State Grid Beijing China State Grid Laboratory of Power cyber Security Protection and Monitoring Technology China Electric Power Research Institute Nanjing China
During cross-domain access, both communication ends need zero-trust evaluation by the trust assessment node and policy matching for permission. Nodes handling these may face concurrent computing and policy search task... 详细信息
来源: 评论
Lightweight Blockchain-based Identity Authentication Scheme for power Terminal  3
Lightweight Blockchain-based Identity Authentication Scheme ...
收藏 引用
3rd International Conference on Electrical Engineering and Control Science, IC2ECS 2023
作者: Chen, Lu Zhang, Tao Ma, Yuanyuan Dai, Zaojian State Grid Smart Grid Research Institute Co. Ltd Nanjing210003 China State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing210003 China
In recent years, the construction of the power Internet of Things continues to advance, and the number of power terminal equipment is growing. However, the computing power and storage capacity of these terminal device... 详细信息
来源: 评论
RRDD: An ATT&CK-based ICS Network security Risk Assessment Method  23
RRDD: An ATT&CK-based ICS Network Security Risk Assessment M...
收藏 引用
2nd International Conference on Networks, Communications and Information technology, CNCIT 2023
作者: Wang, Yuman Wang, Wenhui Bai, Xiaoxue Hu, Bo Ge, Guangkai Qian, Kexiang State Grid Smart Grid Research Institute Co. Ltd Sgri Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China State Grid Liaoning Electric Power Supply Co. Ltd China School of Information and Communication Engineering Beijing University of Posts and Telecommunications State Grid Smart Grid Research Institute Co. Ltd Sgri Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China
The current network security situation of industrial control systems is becoming increasingly severe, and the ICS ATT&CK framework provides a unified knowledge base for attack tactics and techniques for industrial... 详细信息
来源: 评论
Deep Learning Based Wireless Device Identification Using RF Fingerprint  3
Deep Learning Based Wireless Device Identification Using RF ...
收藏 引用
3rd International Conference on Neural Networks, Information and Communication Engineering, NNICE 2023
作者: Lu, Ziang Wang, Tengyan Liu, Xin Li, Nige State Grid Smart Grid Research Institute Co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing China State Grid Shandong Electric Power Research Institute Jinan China
The wireless network physical layer identity authentication technology has received more and more attention due to its strong resistance to camouflage attacks. This work studies a physical layer method that uses radio... 详细信息
来源: 评论
Research and Implementation of Multi Fusion Data Model Construction technology for Distribution Network Digital Twins  2nd
Research and Implementation of Multi Fusion Data Model Const...
收藏 引用
2nd World Conference on Intelligent and 3D Technologies, WCI3DT 2023
作者: Qiao, Junfeng Peng, Lin Zhou, Aihua Pan, Sen Yang, Pei Mao, Yanfang Zhu, Fuyun State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.LTD Jiangsu Nanjing210003 China Nantong Power Supply Company State Grid Jiangsu Electric Power Supply Co. LTD Jiangsu Nanjing210014 China
The core of digital twin is the digital reconstruction of physical space, that is the physical space perception and processed data are applied to the virtual space to achieve real-time mapping of physical space throug... 详细信息
来源: 评论
Attack-Aware Capability Assessment Method Based on Specific Semantic Search  6
Attack-Aware Capability Assessment Method Based on Specific ...
收藏 引用
6th International Conference on Electronic Engineering and Informatics, EEI 2024
作者: Zhang, Daojuan Zhao, Qi Wang, Yuman Li, Shu Tian, Zheng Sun, Yizhen State Grid Smart Grid Research Institute co. Ltd State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Beijing China State Grid information & Communication Company of Hunan Electric Power Corporation Hunan Provincial Key Laboratory of Internet of Things in Electricity Hunan Changsha China
In this paper, we propose an attack perception capability assessment method based on the specific semantic search for the problem of attack perception capability assessment of security protection equipment for power m... 详细信息
来源: 评论
Low-Code Penetration Testing Payload Generation Tool Based on Msfvenom  3
Low-Code Penetration Testing Payload Generation Tool Based o...
收藏 引用
3rd International Conference on Advanced Manufacturing technology and Electronic Information, AMTEI 2023
作者: Li, Shu Tian, Zheng Sun, Yizhen Zhu, Hongyu Zhang, Daojuan Wang, Huiwen Wu, Qitian Hunan Provincial Key Laboratory of Internet of Things in Electricity State Grid Information & Communication Company of Hunan Electric Power Corporation Hunan Changsha China State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co. Ltd. Beijing China
This article proposes a penetration testing payload generation tool based on the Qt graphical interface and msfvenom. The aim is to provide a user-friendly graphical interface that enables penetration testing professi... 详细信息
来源: 评论
Research on Updating and Correcting 3D Data Model for power grid Infrastructure Transfer Inspection and Handover  3rd
Research on Updating and Correcting 3D Data Model for Power ...
收藏 引用
3rd World Conference on Intelligent and 3D Technologies, WCI3DT 2024
作者: Wang, Gang Yu, Hai Wang, Fei Fan, Zikai Dai, Jiao Wang, He State Grid Smart Grid Research Institute CO. LTD Nanjing210003 China State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing210003 China State Grid Jiangsu Electric Power Co. Ltd. Economic and Technological Research Institute Nanjing210009 China
In response to the deviation between the 3D design model and the actual situation, this article studies the difference and color texture correction techniques between point clouds and design models, as well as the upd... 详细信息
来源: 评论