- Smart Grid Security and Resilience
- Technology and Security Systems
- Information and Cyber Security
- Smart Grid and Power Systems
- Advanced Decision-Making Techniques
- Legal and Policy Issues
- Photoacoustic and Ultrasonic Imaging
- Data Management and Algorithms
- Advanced Malware Detection Techniques
- Advanced Clustering Algorithms Research
- Blockchain Technology Applications and Security
- Border Security and International Relations
- Advanced Authentication Protocols Security
- Software Reliability and Analysis Research
- Wireless Body Area Networks
- Data Mining Algorithms and Applications
- Software-Defined Networks and 5G
- E-commerce and Technology Innovations
- Optical Imaging and Spectroscopy Techniques
- Thermography and Photoacoustic Techniques
- Network Security and Intrusion Detection
- Vehicular Ad Hoc Networks (VANETs)
- Big Data Technologies and Applications
- Anomaly Detection Techniques and Applications
- Risk and Safety Analysis
Inner Mongolia Electric Power (China)
2019-2024
North China Electric Power University
2023
Xinjiang Entry-Exit Inspection and Quarantine Bureau
2018
Jilin Province Science and Technology Department
2014
Jilin University
2014
As a key area of new infrastructure, 5G development strategy is constantly clear, and various industries have developed around 5G. However, services, architecture, technologies, openness the network make security issues become focus. This article focuses on relevant application scenarios in power field, analyzes discusses risks that technology brings to grid, this basis, proposes technical solutions enhance for industry applications, follow-up suggestions.
In order to improve the information security level of intelligent substation, this paper proposes an substation assessment tool through research and analysis risk method, proves that can effectively detect it. It is great significance carry out on industrial control systems, especially security.
In order to evaluate the network security risks and implement effective defenses in industrial control system, a risk assessment method for systems based on attack graphs is proposed. Use concept of elements translate attacks into state migration problems build an graph model. view current subjective evaluation expert experience, atomic probability assignment CVSS system were introduced status system. Finally, taking centralized thermal power plant as experimental background, case analysis...
Aiming at the current status and risks of industrial control system information security, a security protection was proposed from technical management levels. At level, it strengthen by setting up firewall protection, isolating engineer stations, conducting tests, deploying network monitoring. improves safety through measures such as real-time maintenance updating existing systems technology standards. Finally, feasibility this proved experiments, which has certain reference significance for...
In order to enhance the network security protection level of intelligent substation, this paper puts forward a model substation defense system through analysis risk and demand, using example proved feasibility effectiveness system. It is provides new solution.
With the rapid development of electricity Internet Things, intelligent terminals in power system are widely interconnected and ubiquitously connected. The have become main target springboard for attacking grid. In this context, researches carried out on security protection Things. First, combined with architecture connotation basic characteristics summarized. Then risk summarized based risks it faced, finally corresponding countermeasures proposed from four aspects, namely encryption...
The mainstream technology of network security protection has gradually transited from the past "rule base" to dynamic perception based on big data. development knowledge atlas injected new vitality into research. Based limited Boltzmann machine, this paper realizes deep learning features, maps them high dimensional space low layer by layer, and builds a map. Then, proposes situational awareness framework, which integrates series technologies automation tools, It can automatically efficiently...
In photoacoustic tomography (PAT), object identification and classification are usually performed as postprocessing processes after image reconstruction. Since useful information about the target implied in raw signal can be lost during reconstruction, this two-step scheme reduce accuracy of tissue characterization. For learning-based methods, it is time consuming to train network each subtask separately. paper, we report on an end-to-end joint learning framework for simultaneous...
The rapid development of cloud computing and Internet Things technology has caused the explosive growth data scale high complexity models, leading to cluster research facing many new problems challenges, such as massive environments. This paper deeply studies parallel CKLDC-means clustering algorithm based on Hadoop platform, gives design method strategy. Experiments multiple sets different sizes show that designed a good acceleration ratio expansion rate, is suitable for analysis mining data.