Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230700171-8.doi: 10.11896/jsjkx.230700171
• Interdiscipline & Application • Previous Articles Next Articles
LI Fei, CHEN Tong
CLC Number:
[1]HEEGAARD P E,TRIVERDI K S.Network Survivability mo-deling[J].Computer Nerworks,2009(1):1215-1234. [2]MARK W,KOOSHA M,SAHRA S S,et al.Survivability Eva-luation and Importance Analysis For Cyber-Physical Smart Grids[J].Reliability Engineering Amp;System security,2021,210:107479. [3]KONSTANTINOU C.Toward a Secure and Resilient All-Renewable Energy Grid for Smart Cities[J].IEEE Consumer Electronics Magazine,2022,11(1):33-41. [4]TOMAS L,RODRIGO M,ALEJANDRO N E,et al.Identifying Optimal Portfolios of Resilient Network Investments Against Natural Hazards,With Applications to Earthquakes[J].IEEE Transactions on Power Systems,2020,35(2):1411-1421. [5]WANG Z K,DING T,JIA W H,et al.Multi-stage stochasticprogramming for resilient integrated electricity and natural gas distribution systems against typhoon natural disaster attacks[J].Renewable and Sustainable Energy Reviews,2022,159:111784. [6]WU X N,LIAO B R,SU Y G,et al.Multi-objective and multi-algorithm operation optimization of integrated energy system considering ground source energy and solar energy[J].International Journal of Electrical Power & Energy Systems,2023,144:108529. [7]BAI X W,LIU D W,TAN J,et al.Dynamic Identification ofCritical Nodes and Regions in Power Grid Based on Spatio-Temporal Attribute Fusion of Voltage Trajectory[J].Energies,2019,12(5):780. [8]TAMIRU D,JIWANJOT S,VIJAY K.Sood.Evaluation of agrid-connected reduced-component boost multilevel inverter(BMLI) topology[J].International Journal of Circuit Theory and Applications,2022,50(6):2075-2107. [9]NABIL M,TAMAS K,MIHAI C.Communication-Free Equivalent Grid Impedance Estimation Technique for Multi-Inverter Systems[J].IEEE Transactions on Industrial Electronics,2023,70(2):1542-1552. [10]NASSER N,FAZELI M.Buffered-Microgrid Structure for Fu-ture Power Networks;a Seamless Microgrid Control[J].IEEE Transactions on Smart Grid,2021,12(1):131-140. [11]XU Z P,JOSE E R,LIU Y,et al.A new resilience-based component importance measure for multi-state networks[J].Reliability Engineering & System security,2020,193:106591. [12]BAI Y S,LI SH Y,GU X P,et al.Collaborative planning of resilient backbone grids and PMU placement for power systems[J].International Journal of Electrical Power & Energy Systems,2021,131:107106. [13]CHENG M,YAN X M,ZHOU J W.Negative-Sequence Current Compensation-Based Coordinated Control Strategy for Dual-Cage-Rotor Brushless Doubly Fed Induction Generator Under Unbalanced Grid Conditions[J].IEEE Transactions on Indus-trial Electronics,2023,70(5):4762-4773. [14]ARIEF N P,SIGITP S,LEONARDO G,et al.Countermeasures design and analysis for occupant survivability of an armored vehicle subjected to blast load[J].Journal of Mechanical Science and Technology,2020,34(5):1893-1899. [15]YANG L,CHEN Y,QIU Q G,et al.Risk Control of Mission-Critical Systems:Abort Decision-Makings Integrating Health and Age Conditions[J].IEEE Transactions on Industrial Informatics,2022,18(10):6887-6894. [16]ZHAO X,CHAI X F,SUN J L,et al.Joint Optimization of Mis-sion Abort And Component Switching Policies For Multistate Warm Standby Systems[J].Reliability Engineering & System security,2021,212:107641. [17]HE Y T.On the generalized Survivability of Aircraft and itsEvaluation Method[J].Acta Aeronautica et Astronautica Sinica,2022,43(6):185-193. [18]JAIN N K,YADAV D S,VERMA A.Neuro-Fuzzy and Fuzzy Schemes For Cooperative Communication In Wireless Sensor Network:A Military Battlefield Scenario[J].IET Communications,2020,14(21):3761-3770. [19]SHI Q,DING Y H,QING L,et al.Survivability Assessment for Wireless Sensor Networks[J].Journal of Central North University(Natural Science Edition),2020,41(5):418-430,436. [20]CEN H F,YANG X Y,WANG Y T,et al.A planning method for secure power networks with microgrids based on survivability evaluation[J].Power System Protection and Control,2020,48(22):109-117. [21]DONG F F,LIU D CH,WU J,et al.Constructing core backbone network based on survivability of power grid[J].International Journal of Electrical Power & Energy Systems,2015,67:161-167. [22]LOU Y Y,CHEN C M,LIU X M,et al.Multi-Objective Planning Method for Backbone Grid Considering Economy and Multi-Stage Anti-Disaster Performance[J].Southern Power System Technology,2022,16(3):32-39. [23]ABOLFAZL R,JORDAN P,RIBAL A,et al.A resilience-based recovery scheme for smart grid restoration following cyberattacks to substations[J].International Journal of Electrical Power & Energy Systems,2023,145:108610. [24]GIAP L,SIFAT F,ANDREA M,et al.Survivable virtual network mapping with content connectivity against multiple link failures in optical metro networks[J].Journal of Optical Communications and Networking,2020,12(11):301-311. |
[1] | WANG Zhen, ZHOU Chao, FAN Yongwen, Shi Pengfei. Overview of Unmanned Aerial Vehicle Systems Security [J]. Computer Science, 2024, 51(6A): 230800086-6. |
[2] | TIAN Hao, WANG Chao. Design and Implementation of SNMPv3 Security Mechanism Based on National Security SM3 andSM4 Algorithms [J]. Computer Science, 2024, 51(6A): 230500209-7. |
[3] | XUE Jianbin, DOU Jun, WANG Tao, MA Yuling. Scheme for Maximizing Secure Communication Capacity in UAV-assisted Edge Computing Networks [J]. Computer Science, 2024, 51(6A): 230800032-7. |
[4] | JIA Fan, YIN Xiaokang, GAI Xianzhe, CAI Ruijie, LIU Shengli. Function-call Instruction Characteristic Analysis Based Instruction Set Architecture Recognization Method for Firmwares [J]. Computer Science, 2024, 51(6): 423-433. |
[5] | LIU Chunling, QI Xuyan, TANG Yonghe, SUN Xuekai, LI Qinghao, ZHANG Yu. Summary of Token-based Source Code Clone Detection Techniques [J]. Computer Science, 2024, 51(6): 12-22. |
[6] | HUO Xingxing, HU Ruimin, LI Yixin. Early-stage Fatigue Detection Based on Frequency Domain Information of Eye Features [J]. Computer Science, 2024, 51(6): 247-255. |
[7] | LI Panpan, WU Hao, LIU Jiajia, DUAN Li, LU Yunlong. Overview of Security Technologies and Strategies for Intelligent Railway 5G [J]. Computer Science, 2024, 51(5): 1-11. |
[8] | WANG Gengrun. Survey of Research and Application of User Identity Linkage Technology in Cyberspace [J]. Computer Science, 2024, 51(5): 12-20. |
[9] | PANG Yuxiang, CHEN Zemao. Security Scheme of UAV Flight Control Based on Attribute Access Control Policy [J]. Computer Science, 2024, 51(4): 366-372. |
[10] | HUANG Nan, LI Dongdong, YAO Jia, WANG Zhe. Decentralized Federated Continual Learning Method Combined with Meta-learning [J]. Computer Science, 2024, 51(3): 271-279. |
[11] | SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13. |
[12] | ZHAO Yue, HE Jinwen, ZHU Shenchen, LI Congyi, ZHANG Yingjie, CHEN Kai. Security of Large Language Models:Current Status and Challenges [J]. Computer Science, 2024, 51(1): 68-71. |
[13] | WANG Jing, ZHANG Miao, LIU Yang, LI Haoling, LI Haotian, WANG Bailing, WEI Yuliang. Study on Dual-security Knowledge Graph for Process Industrial Control [J]. Computer Science, 2023, 50(9): 68-74. |
[14] | ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang. Smart Contract Fuzzing Based on Deep Learning and Information Feedback [J]. Computer Science, 2023, 50(9): 117-122. |
[15] | ZHONG Yue, GU Jieming, CAO Honglin. Survey of Lightweight Block Cipher [J]. Computer Science, 2023, 50(9): 3-15. |
|