To solve the problem of large recognition errors in traditional attack information identification methods, we propose a machine learning (ML)-based identification method for electric power Internet attack information. Based on the Internet attack information, an Internet attack information model is constructed, the identification principle of the power Internet attack information is analysed based on ML, hash fixing is conducted to ensure that the same attack information will be assigned to the same thread and that the deviation generated by noise can be avoided so that the real-time lossless processing of the power Internet attack information can be ensured. The vulnerability adjacency matrix is constructed, and the vulnerability is quanti...
The massive integration of low-cost communication networks and Internet of Things (IoT) in today\u27...
Power system cybersecurity has recently become important due to cyber-attacks. Due to advanced compu...
Over the last several years side-channel analysis has emerged as a major threat to securing sensitiv...
To solve the problem of large recognition errors in traditional attack information identification me...
In this research, the authors propose a novel method to detect 34567890- based on machine learning. ...
With the rapid development of power grid informatization, the power system has evolved into a multi-...
Concern about cyber-security is growing worldwide with the advancement of smart control and networki...
Operational and planning modules of energy systems heavily depend on the information of the underlyi...
The safe operation of smart distribution network is highly dependent on the powerful technical guara...
The continuous and accelerated digitalization of industries and technologies has made most of our da...
Today vehicles are connected to private networks which are owned by the car manufacturer. But in com...
To detect false data injection attacks (FDIAs) in power grid reconstruction and solve the problem of...
International audienceThe Internet of Things (IoT) has continued gaining in popularity and importanc...
The cyber physical systems integrate the sensing, computation, control and networking processes into...
The public network access to smart grids has a great impact on the system‘s safe operation. With the...
The massive integration of low-cost communication networks and Internet of Things (IoT) in today\u27...
Power system cybersecurity has recently become important due to cyber-attacks. Due to advanced compu...
Over the last several years side-channel analysis has emerged as a major threat to securing sensitiv...
To solve the problem of large recognition errors in traditional attack information identification me...
In this research, the authors propose a novel method to detect 34567890- based on machine learning. ...
With the rapid development of power grid informatization, the power system has evolved into a multi-...
Concern about cyber-security is growing worldwide with the advancement of smart control and networki...
Operational and planning modules of energy systems heavily depend on the information of the underlyi...
The safe operation of smart distribution network is highly dependent on the powerful technical guara...
The continuous and accelerated digitalization of industries and technologies has made most of our da...
Today vehicles are connected to private networks which are owned by the car manufacturer. But in com...
To detect false data injection attacks (FDIAs) in power grid reconstruction and solve the problem of...
International audienceThe Internet of Things (IoT) has continued gaining in popularity and importanc...
The cyber physical systems integrate the sensing, computation, control and networking processes into...
The public network access to smart grids has a great impact on the system‘s safe operation. With the...
The massive integration of low-cost communication networks and Internet of Things (IoT) in today\u27...
Power system cybersecurity has recently become important due to cyber-attacks. Due to advanced compu...
Over the last several years side-channel analysis has emerged as a major threat to securing sensitiv...