Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 588-593.doi: 10.11896/jsjkx.210200151
• Information Security • Previous Articles Next Articles
LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang
CLC Number:
[1] ZHANG P.A new generation power information networksecuri-ty architecture approach[J].Electronic Technology & Software Engineering,2019(20):194-195. [2] GAO K,LIU J,XU R.A hybrid security situation prediction model for information network based on support vector machine and particle swarm optimization[J].Power System Technology,2011,35(4):176-182. [3] BAI X,NURBOL,WANG Y D.Map Analysis for Research Status and Development Trend on Network Security Situational Awareness[J].Computer Science,2020,47(S1):340-343,348. [4] LI X,DUAN Y C.Network Security Situation AssessmentMethod Based on Improved Hidden Markov Model[J].ComputerScience,2020,47(7):287-291. [5] WANG X P,XIONG P,LI W W.Application of Firewall and IDS in the Information Network for Power Enterprises[J].Automation of Electric Power Systems,2002(5):60-63. [6] LI Z M,CONG L,ZHENG Y,et al.Information Security As-sessment of Power Systems Based on SSE-CMM[J].Automation of Electric Power Systems,2003(23):37-40. [7] HUANG X,CHEN D C,SUN J,et al.A Review of Information Security Research in Power System Under Cyber Attack[J].Electrical Measurement & Instrumentation,2017,54(23):68-74. [8] FENG X.One Kind of New Security Model of Power Information Systems and its Assessment Methods[J].Journal of North China Electric Power University,2010,37(5):47-51. [9] ZHANG X,CHEN X H,LIU X.Construction of InformationSecurity Baseline Standardization System for Power Systems[J].Electric Power Information and Communication Techno-logy,2013,11(11):110-114. [10] ZHANG S C.Research on the Architecture and Key Technology of Information Security Defense System in Smart Grid[D].Beijing:North China Electric Power University,2016. [11] ZHANG A Q.The application of firewall in power enterprise information network[J].Information & Communications,2018(12):173-174. [12] XU R,WANG Y.A study on electric power information network-oriented security situation awareness[J].Power System Technology,2012,37(1):53-57. [13] XIE L J,WANG Y C,YU J B.Network Security Situation Awareness Based on Neural Networks[J].Journal of Tsinghua University(Science & Technology),2013,53(12):1750-1760. [14] LUO S.Research on Network Security Situation Assessment and Prediction Based on Neural Network[D].Xi'an:Northwest University,2018. [15] LI S X.Research on Network Security Situation Awareness Based on Improved LSTM Neural Network[D].Shijiazhuang:Hebei Normal University,2020. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[3] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[4] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[5] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[6] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[7] | WANG Jin-heng, SHAN Zhi-long, TAN Han-song, WANG Yu-lin. Network Security Situation Assessment Based on Genetic Optimized PNN Neural Network [J]. Computer Science, 2021, 48(6): 338-342. |
[8] | ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300. |
[9] | LIU Quan-ming, LI Yin-nan, GUO Ting, LI Yan-wei. Intrusion Detection Method Based on Borderline-SMOTE and Double Attention [J]. Computer Science, 2021, 48(3): 327-332. |
[10] | ZHAO Dong-mei, SONG Hui-qian, ZHANG Hong-bin. Network Security Situation Based on Time Factor and Composite CNN Structure [J]. Computer Science, 2021, 48(12): 349-356. |
[11] | JIANG Jian-feng, SUN Jin-xia, YOU Lan-tao. Security Clustering Strategy Based on Particle Swarm Optimization Algorithm in Wireless Sensor Network [J]. Computer Science, 2021, 48(11A): 452-455. |
[12] | WANG Yu-chen, QI Wen-hui, XU Li-zhen. Security Cooperation of UAV Swarm Based on Blockchain [J]. Computer Science, 2021, 48(11A): 528-532. |
[13] | MA Lin, WANG Yun-xiao, ZHAO Li-na, HAN Xing-wang, NI Jin-chao, ZHANG Jie. Network Intrusion Detection System Based on Multi-model Ensemble [J]. Computer Science, 2021, 48(11A): 592-596. |
[14] | LI Xin, DUAN Yong-cheng. Network Security Situation Assessment Method Based on Improved Hidden Markov Model [J]. Computer Science, 2020, 47(7): 287-291. |
[15] | BAI Xue, Nurbol and WANG Ya-dong. Map Analysis for Research Status and Development Trend on Network Security Situational Awareness [J]. Computer Science, 2020, 47(6A): 340-343. |
|