![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Transient Grid Security Control Algorithm Based on EMS System
The transient security control aims to effectively improve the stability of the grid system and prevent large-scale blackouts in the system. In this paper, based on the actual and effective grid data filtered...
-
Chapter and Conference Paper
Automatic Security Baseline Verification Method Based on SCAP and Cloud Scanning
With the development of power networks, automated verification of security baselines has become increasingly important. Traditional verification methods have disadvantages such as low efficiency, inability to ...
-
Chapter and Conference Paper
Research and Design of Mobile Storage Monitoring Based on File Filter Driver
In order to deal with the problem that the confidential information in the intranet is easily leaked, the method based on file filter driver is used for mobile storage monitoring to solve such problem. Through...
-
Chapter and Conference Paper
Robust Analysis of Grid System Based on Complex Network Attack Mode
With the continuous construction of the grid, its scale is getting larger and larger and the degree of connection is becoming more and more complicated, which means the structure of the grid gradually meets th...
-
Chapter and Conference Paper
A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System
In this paper, a network illegal access detection method based on PSO-SVM algorithm in the power monitoring system is proposed, where the particle swarm optimization (PSO) algorithm is used to optimize the par...
-
Article
The Study of Chinese Historiography from the Perspective of Intellectual History
To promote historical research today, one needs to create a vigorous environment for historiographic criticism, to summarize the progress and state of all fields and topics of history, and to enhance the study...