Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Transient Grid Security Control Algorithm Based on EMS System

    The transient security control aims to effectively improve the stability of the grid system and prevent large-scale blackouts in the system. In this paper, based on the actual and effective grid data filtered...

    Yang Su, Song Liu, Zhihong Liang in Security with Intelligent Computing and Bi… (2020)

  2. No Access

    Chapter and Conference Paper

    Automatic Security Baseline Verification Method Based on SCAP and Cloud Scanning

    With the development of power networks, automated verification of security baselines has become increasingly important. Traditional verification methods have disadvantages such as low efficiency, inability to ...

    Yanzhou Chen, Qi Wang, Meng Sun, Peng Chen in The 8th International Conference on Comput… (2020)

  3. No Access

    Chapter and Conference Paper

    Research and Design of Mobile Storage Monitoring Based on File Filter Driver

    In order to deal with the problem that the confidential information in the intranet is easily leaked, the method based on file filter driver is used for mobile storage monitoring to solve such problem. Through...

    Bo He, An Zhou, Chao Hu, Duan Liang in The 8th International Conference on Comput… (2020)

  4. No Access

    Chapter and Conference Paper

    Robust Analysis of Grid System Based on Complex Network Attack Mode

    With the continuous construction of the grid, its scale is getting larger and larger and the degree of connection is becoming more and more complicated, which means the structure of the grid gradually meets th...

    Jun **ang, Jiao Zhu, Shuyang Guo, Yue Chen in Artificial Intelligence and Security (2019)

  5. No Access

    Chapter and Conference Paper

    A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System

    In this paper, a network illegal access detection method based on PSO-SVM algorithm in the power monitoring system is proposed, where the particle swarm optimization (PSO) algorithm is used to optimize the par...

    Yang Su, Wenzhe Zhang, Wenwen Tao, Zhizhong Qiao in Cloud Computing and Security (2018)

  6. No Access

    Article

    The Study of Chinese Historiography from the Perspective of Intellectual History

    To promote historical research today, one needs to create a vigorous environment for historiographic criticism, to summarize the progress and state of all fields and topics of history, and to enhance the study...

    Zhizhong Qiao in Frontiers of History in China (2006)