![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Transient Grid Security Control Algorithm Based on EMS System
The transient security control aims to effectively improve the stability of the grid system and prevent large-scale blackouts in the system. In this paper, based on the actual and effective grid data filtered...
-
Chapter and Conference Paper
Automatic Security Baseline Verification Method Based on SCAP and Cloud Scanning
With the development of power networks, automated verification of security baselines has become increasingly important. Traditional verification methods have disadvantages such as low efficiency, inability to ...
-
Chapter and Conference Paper
Research and Design of Mobile Storage Monitoring Based on File Filter Driver
In order to deal with the problem that the confidential information in the intranet is easily leaked, the method based on file filter driver is used for mobile storage monitoring to solve such problem. Through...
-
Chapter and Conference Paper
A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System
In this paper, a network illegal access detection method based on PSO-SVM algorithm in the power monitoring system is proposed, where the particle swarm optimization (PSO) algorithm is used to optimize the par...