-
61
Network security threat prevention and control system of electric power monitoring systems for wind farm
Published 2020-05-01“…The frequent occurrence of network security incidents on wind farms seriously threatens the safety of power plants and power grids.The network security risk of power monitoring system on wind farms was analyzed from five aspects,including structure security,system ontology,security management,security emergency and infrastructure physical security.In view of the existing security protection technology,a security threat prevention and control system was put forward to ensure the safe and stable operation of the power monitoring system of wind farms and power grid from four aspects of security protection,security monitoring,access control and security management.…”
Get full text
Article -
62
Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security
Published 2023-01-01Subjects: Get full text
Article -
63
-
64
Research on new energy station network security assessment method based on improved LSTM network
Published 2024-10-01Subjects: Get full text
Article -
65
-
66
-
67
Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model.
Published 2025-01-01“…To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. …”
Get full text
Article -
68
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01“…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
Get full text
Article -
69
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
70
Study on modern malware analysis system
Published 2014-10-01Subjects: “…network security…”
Get full text
Article -
71
A survey of firewall technology based on image content filtering
Published 2003-01-01Subjects: Get full text
Article -
72
-
73
Trustworthy network based on blockchain technology
Published 2019-10-01Subjects: Get full text
Article -
74
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…In recent years, network security has become a major concern. Using the Internet to store and analyze data has become an integral aspect of the production and operation of many new and traditional enterprises. …”
Get full text
Article -
75
Design and implementation of the controller scheduling-time in SDN
Published 2018-01-01Subjects: Get full text
Article -
76
Selfish mining detection scheme based on the characters of transactions
Published 2023-04-01Subjects: Get full text
Article -
77
Safe communicated model of SIP network based on improved SIP protocol
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
78
Anomaly detection in backbone networks using Filter-ary-Sketch
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
79
Overview on industrial Internet honeynet technology
Published 2024-10-01Subjects: Get full text
Article -
80
Defense mechanism of SDN application layer against DDoS attack based on API call management
Published 2022-04-01Subjects: Get full text
Article