436
Views
0
CrossRef citations to date
0
Altmetric
Special Issue: Artificial Intelligence-based Cyber Defence Microservices for Protecting Critical Infrastructures

Security situational awareness of power information networks based on machine learning algorithms

, , , , &
Article: 2284649 | Received 02 Jul 2023, Accepted 14 Nov 2023, Published online: 27 Nov 2023

References

  • Chen, Z., Guo, Y., Bai, D., Wang, J., Dong, Y., Qian, S., Lu, T., & Xing, H. (2021a). Research on cyber security defense and protection in power industry. Journal of Physics: Conference Series, 1769(1), 012040 (7pp). https://doi.org/10.1088/1742-6596/1769/1/012040
  • Chen, Z., Yan, L., Lü, Z., Zhang, Y., Guo, Y., Liu, W., & Xuan, J. (2021b). Research on zero-trust security protection technology of power iot based on blockchain. Journal of Physics: Conference Series, 1769(1), 012039 (8pp). https://doi.org/10.1088/1742-6596/1769/1/012039
  • Envelope, L. L. (2022). Research on status information monitoring of power equipment based on internet of things. Energy Reports, 8, 281–286.
  • He, J., Shang, B., Li, Y., & Yin, B. (2020). Research on automatic mining and utilization of vulnerability in power web system. Journal of Physics: Conference Series, 1550(3), 032057 (7pp). https://doi.org/10.1088/1742-6596/1550/3/032057
  • Huang, F., Yong, M., & Jian, Z. (2021). Genetic algorithm-based power system information security risk assessment method. Journal of Physics: Conference Series, 1852(2), 022063 (7pp). https://doi.org/10.1088/1742-6596/1852/2/022063
  • Lai, J., Wu, J., & Jiang, Y. (2020). Research on risk prevention measures of network information security in power systems. IOP Conference Series: Materials Science and Engineering, 768(6), 062018 (4pp). https://doi.org/10.1088/1757-899X/768/6/062018
  • Li, G., Peng, Z., & Yu, B. (2021). Research on self-healing mode of communication channel of regional power grid stability control system. Journal of Physics: Conference Series, 1982(1), 012157 (6pp). https://doi.org/10.1088/1742-6596/1982/1/012157
  • Liang, Y., Zhang, L., Wang, S., Zhang, J., Zhang, J., & Wu, M. (2021). Research on network threat and situation assessment method of electric power information system. Journal of Physics: Conference Series, 1883(1), 012105 (7pp). https://doi.org/10.1088/1742-6596/1883/1/012105
  • Lin, T., Zhao, Y., Zhang, H., Li, G., & Zhang, J. (2021). Research on information security system of ship platform based on cloud computing. Journal of Physics: Conference Series, 1802(4), 042032 (7pp). https://doi.org/10.1088/1742-6596/1802/4/042032
  • Liu, S., Yu, Y., Guo, A., Zhao, Z. Y., Wu, Z. H., & Zhou, Y. (2021). Research on security verification mechanism of perception layer terminal of power internet of things based on device operation fingerprint. IOP Conference Series: Earth and Environmental Science, 692(2), 022024 (7pp). https://doi.org/10.1088/1755-1315/692/2/022024
  • Liu, X., Wang, H., Sun, Q., & Guo, T. (2022). Research on fault scenario prediction and resilience enhancement strategy of active distribution network under ice disaster. International Journal of Electrical Power & Energy Systems, 135(3), 107478. https://doi.org/10.1016/j.ijepes.2021.107478
  • Liu, Z., & Yang, W. (2023). Research on the value positioning of university library based on customer delivered value. Asian Agricultural Research, 15(2), 4.
  • Ma, T., & Zhang, G. (2021). Research on self-adaptive clustering algorithms for large data sparse networks based on information entropy. Journal of Physics: Conference Series, 1941(1), 012041 (13pp). https://doi.org/10.1088/1742-6596/1941/1/012041
  • Meng, L. (2022). Internet of things information network security situational awareness based on machine learning algorithms. Mobile Information Systems, 2022.
  • Shi, S., Wang, L., Zheng, S., Lv, J., & Zhang, Q. (2019). Research on multiple security authentication schemes for mobile applications of power trading platforms. IOP Conference Series: Materials Science and Engineering, 486(1), 012108. https://doi.org/10.1088/1757-899X/486/1/012108
  • Shu, Z. M., Liu, Y. G., Wang, H. N., Sun, C. L., & He, S. S. (2021). Research on the technology of preventing illegal terminal access. Journal of Physics: Conference Series, 1871(1), 012144. https://doi.org/10.1088/1742-6596/1871/1/012144
  • Song, X., Hao, C., Zhang, X., & Wang, Y. (2021). Research on power environment monitoring system of information room. IOP Conference Series: Earth and Environmental Science, 680(1), 012024 (5pp). https://doi.org/10.1088/1755-1315/680/1/012024
  • Wang, L. (2021). Retracted: research on network security maintenance based on computer technology. Journal of Physics: Conference Series, 1915(2), 022001 (5pp). https://doi.org/10.1088/1742-6596/1915/2/022001
  • Wang, S., Zhang, L. H., Zhang, J., Tang, C., & Wang, H. (2021). Research on intelligent identification method for access equipment of grid information system. Journal of Physics: Conference Series, 1792(1), 012015 (6pp). https://doi.org/10.1088/1742-6596/1792/1/012015
  • Wang, Y., Gao, Y., & Luo, B. B. (2020). Research on security protection technology based on terminal information jump. Journal of Physics: Conference Series, 1651(1), 012044 (4pp). https://doi.org/10.1088/1742-6596/1651/1/012044
  • Wu, X., Wei, D., Vasgi, B. P., Oleiwi, A. K., Bangare, S. L., & Asenso, E. (2022). Research on Network Security Situational Awareness Based on Crawler Algorithm. Security and Communication Networks, 2022.
  • Xu, H., Li, H., Chen, S., & Wu, X. (2021). Research on health assessment of electric power information system based on deep belief networks and cluster analysis. IOP Conference Series: Earth and Environmental Science, 675(1), 012123 (9pp). https://doi.org/10.1088/1755-1315/675/1/012123
  • Yang, C. Y., Ling, Y., & Li, X. (2021). Research on information encryption algorithm under the power network communication security model. Journal of Physics: Conference Series, 1852(3), 032007 (7pp). https://doi.org/10.1088/1742-6596/1852/3/032007
  • Yu, T., Yin, X., Yao, M., & Liu, T. (2021). Network security monitoring method based on deep learning. Journal of Physics: Conference Series, 1955(1), 012040 (6pp). https://doi.org/10.1088/1742-6596/1955/1/012040
  • Zeng, H. (2021). SolarWinds supply chain breach threatens government agencies and enterprises worldwide. Network Security, 2021(1), 1–3. https://doi.org/10.1016/S1353-4858(21)00001-5
  • Zhang, L. H., Liang, Y., Tang, Y., Wang, S., Tang, C., & Liu, C. (2021). Research on unknown threat detection method of information system based on deep learning. Journal of Physics: Conference Series, 1883(1), 012107 (6pp). https://doi.org/10.1088/1742-6596/1883/1/012107
  • Zhao, Q., Cheng, Y., & Zhou, T. (2021). Research on Node localization Algorithm in WSN Based on TDOA. Journal of Physics: Conference Series, 1757(1), 012142 (7pp). https://doi.org/10.1088/1742-6596/1757/1/012142
  • Zhou, J., Pang, L., & Zhang, W. (2023a). Underwater image enhancement method via multi-interval subhistogram perspective equalization. IEEE Journal of Oceanic Engineering, 48(2), 474–488. https://doi.org/10.1109/JOE.2022.3223733
  • Zhou, J., Sun, J., Zhang, W., & Lin, Z. (2023b). Multi-view underwater image enhancement method via embedded fusion mechanism. Engineering Applications of Artificial Intelligence, 121(1), 105946.