Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 409-412.doi: 10.11896/JsJkx.190900160
• Information Security • Previous Articles Next Articles
YAN Zhen1, TIAN Yi1, DUAN Zhi-guo1, YU Zhen-Jiang1, WANG Yu1 and ZHA Fan2
CLC Number:
[1] 邓旭.PTN网络架构中L2转L3设置方案.电信科学,2017,33(6):164-170. [2] 付琪.关于接入层PTN网络结构优化的研究.通讯世界,2015(4):15-16. [3] 郭立强.光传送网PTN网络环网保护.信息通信,2018(8):117-123. [4] 赵菲,何涌波.QoS技术在保证PTN传输网络安全方面的应用研究.信息通信,2017(7):220-221. [5] 李雅丽,李永江.基于TCP通信方案的电力线路状态监测系统研究.电源技术,2015,39(1):175-177. [6] 卢锋.PTN网络结构及优化.科技经济导刊,2016,28(8):73-77. [7] 陈星豪,黄柳萍,陶国飞.基于随机矩阵理论的电力大数据表征方法.电网技术,2017,36(3):35-38. [8] 陈子辉,王硕君,刘勇浩,等.基于数据质量的电能质量监测装置远程可靠性评估.广东电力,2017,30(1):73-78. [9] 周鑫,田兵,许爱东,等.基于CYMDIST的配电网运行优化技术及算例分析.电网与清洁能源,2015,31(2):91-97. [10] 易映萍,罗海,胡四全.小功率光伏并网逆变器控制策略的研究.电力系统保护与控制,2016(4):64-68. [11] 高迪,路瑶,赵娟娟,等.基于 Tabu 算法的配电网无功补偿 .电气自动化,2015(1):91-93. [12] 肖雄,刘治.基于负荷管理终端的电能质量监测研究与分析.广东电力,2016,29(2):85-89. [13] 孙跃,李敏,陈乐然,等.基于POTN技术的电力通信网规划方案.电信科学,2017(S1):522-526,552. [14] 苏永义,隋树法,周忠堂,等.配电网电能质量智能监控方法的研究.自动化与仪器仪表,2017(10):58-60. [15] 吴富杰,苏小林,阎晓霞,等.基于多目标的主动配电网有功无功协调优化.自动化技术与应用,2015,34(11):59-65. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[4] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[5] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[6] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[7] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[8] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[9] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[10] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[11] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[12] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[13] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[14] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[15] | JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278. |
|