Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200158-7.doi: 10.11896/jsjkx.241200158
• Information Security • Previous Articles Next Articles
LI Xiaogeng1, HAN Xiao1, XIAO Haiyi2
CLC Number:
| [1]ZHOU Q X et al.Detection resource allocation scheme for two-layer cooperative IDSs in smartgrids[J].Journal of Parallel and Distributed Computing,2021,147:236-247. [2]SARASWATHI S.Enforcing a source-end cooperative multil-evel defense mechanism to counter floodingattack[J].Computer Systems Science and Engineering,2023,44(1):67-79. [3]LI L X,ZHANG B,WU H M,et al.A novel network proactive defense model:anomaly driven dynamic cooperative defense model[C]//IOP Conference Series:Materials Science and Engineering.2018. [4]FANRONG W et al.Substation area joint defensive protection strategy based on distributed cooperative all-in-onedevice[J].Journal of Modern Power Systems and Clean Energy,2016,4(3):467-477. [5]HONG Q Z,ZI W,WEI L,et al.A method of conflict detectionfor cooperative defense strategy in power industrial control system[J].International Conference on Advanced Cloud and Big Data,2020. [6]CAI X P.Research on information-physical collaborativedefence methods for power system cyber attacks[D].Najjing:Southeast University,2021. [7]LI W,HE H.Design and implementation of a multi-level backup automatic blocking system for source-network-load interaction[J].Computer Applications and Software,2020,37(9):302-309,333. [8]XIAO Y X,MU T,QIN Z Y,et al.Exploration of water resources network security collaborative defence system based on software defined security[J].Pearl River,2023,44(2):122-128,133. [9]TAN S S.Design and implementation of an attack blocking system for virtual-real networks[D].Beijing:Beijing University of Posts and Telecommunications,2015. [10]WANG Z,WANG Z H,HAN Y,et al.Research on multi-layercollaborativedefence model for power system network security[J].Computer Engineering,2021,47(12):131-140. [11]SONG L,FAN Y,LIU M,et al.State estimation method of a new energy power system based on SC-DNN and multi-source datafusion[J].Power System Protection and Control,2023,51:177-187. [12]LIU J Q,W R.An overview of new information transmission methods for powersystems[J].Journal of Northeast Dianli University,2024,44(4):1-8,76. [13]ZHANG D,ZHANG Y,ZANG X X.Anomalous Intrusion Detection Method for Surveillance Video Based on Self-Organising Mathematical Models[J].Journal of Northeast Dianli University,2022,42(4):63-69. [14]HAN Y,WANG Y,CAO Y,et al.A novel wrapped feature selection framework for developing power system intrusion detection based on machine learning methods[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2023,53(11):7066-7076. [15]YAN B,JIANG Z,YAO P,et al.Game Theory based optimaldefensive resources allocation with incomplete information in cyber-physical power systems against false data injection attacks[J].Protection and Control of Modern Power Systems,2024,9(2):115-127. [16]LIU C,ZHU H,ZHOU M,et al.Phase shiftingtransformer-based mitigation strategy for load redistribution attacks in po-wer system optimal power flow[J].IEEE Transactions on Smart Grid,2024,15(5):5127-5138. [17]CHANG Z,WU J,LIANG H,et al.A review of power system false data attack detection technology based on bigdata[J].Information,2024,15(8):439. [18]ABDELKADER S,AMISSAH J,KINGA S,et al.Securing mod-ern power systems:implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks[J].Results in Engineering,2024:102647. [19]ZHANG S,YANG Y,ZHOU Z,et al.DIBAD:A disentangled information bottleneck adversarial defense method using Hilbert-Schmidt independence criterion for spectrum security[J].IEEE Transactions on Information Forensics and Security,2024,19:3879-3891. |
| [1] | WANG Wei, ZHAO Yunlong, PENG Xiaoyu, PAN Xiaodong. TSK Fuzzy System Enhanced by TSVR with Cooperative Parameter Optimization [J]. Computer Science, 2025, 52(7): 75-81. |
| [2] | HUANG Ao, LI Min, ZENG Xiangguang, PAN Yunwei, ZHANG Jiaheng, PENG Bei. Adaptive Hybrid Genetic Algorithm Based on PPO for Solving Traveling Salesman Problem [J]. Computer Science, 2025, 52(6A): 240600096-6. |
| [3] | WANG Sitong, LIN Rongheng. Improved Genetic Algorithm with Tabu Search for Asynchronous Hybrid Flow Shop Scheduling [J]. Computer Science, 2025, 52(4): 271-279. |
| [4] | LANG Aoqi, HUANG Weijie, YU Zhiyong, HUANG Fangwan. Spatiotemporal Active-sampling and Joint Inference of Urban Air Quality Data [J]. Computer Science, 2025, 52(11A): 241000116-9. |
| [5] | JIANG Yakun, LIN Xu. Intrusion Detection Method for Power Monitoring System Based on Multi-source Network Data [J]. Computer Science, 2025, 52(11A): 241200157-7. |
| [6] | YU Ping, YAN Hui, BAO Jie, GENG Xiaozhong. MEC Network Task Offloading and Migration Strategy Based on Optimization Model [J]. Computer Science, 2025, 52(11A): 241200215-6. |
| [7] | XU Haitao, CHENG Haiyan, TONG Mingwen. Study on Genetic Algorithm of Course Scheduling Based on Deep Reinforcement Learning [J]. Computer Science, 2024, 51(6A): 230600062-8. |
| [8] | HUANG Fei, LI Yongfu, GAO Yang, XIA Lei, LIAO Qinglong, DAI Jian, XIANG Hong. Scheduling Optimization Method for Household Electricity Consumption Based on Improved Genetic Algorithm [J]. Computer Science, 2024, 51(6A): 230600096-6. |
| [9] | LI Zhibo, LI Qingbao, LAN Mingjing. Method of Generating Test Data by Genetic Algorithm Based on ART Optimal Selection Strategy [J]. Computer Science, 2024, 51(6): 95-103. |
| [10] | WANG Baocai, WU Guowei. Feature-weighted Counterfactual Explanation Method:A Case Study in Credit Risk Control Scenarios [J]. Computer Science, 2024, 51(12): 259-268. |
| [11] | ZHONG Linhui, YANG Chaoyi, XIA Zihao, HUANG Qixuan, QU Qiaoqiao, LI Fangyun, SUN Wenbin. Style-oriented Software Architecture Evolution Path Generation Method [J]. Computer Science, 2024, 51(11A): 240100130-9. |
| [12] | JIANG Yibo, ZHOU Zebao, LI Qiang, ZHOU Ke. Optimization of Low-carbon Oriented Logistics Center Distribution Based on Genetic Algorithm [J]. Computer Science, 2024, 51(11A): 231200035-6. |
| [13] | HAN Huijian, LIU Kexin, LIN Xue. Air Quality Fuzzy Cognitive Map Forecasting Based on Niche Genetic Algorithm [J]. Computer Science, 2024, 51(11A): 240300120-6. |
| [14] | SI Jianpeng, HONG Zheng, ZHOU Zhenji, CHEN Qian, LI Tao. Keyword Sensitive Fuzzing Method for Embedded Device Firmware [J]. Computer Science, 2024, 51(10): 196-207. |
| [15] | LIU Xuanyu, ZHANG Shuai, HUO Shumin, SHANG Ke. Microservice Moving Target Defense Strategy Based on Adaptive Genetic Algorithm [J]. Computer Science, 2023, 50(9): 82-89. |
|
||