[1] |
MO Yan, TANG Rong-chuan, JU Hao, SUN Shao-fei, WANG An.
Commercial Cryptographic Upgrade for Industrial Internet Platform
[J]. Computer and Modernization, 2023, 0(06): 118-126.
|
[2] |
ZHANG Yun, BAI Kai-feng, WANG Xing, CANG Tian, ZHOU Tong, DUAN Jin-wen, SU Han.
Review of Electricity Theft Detection in Smart Grid Environment
[J]. Computer and Modernization, 2023, 0(03): 60-65.
|
[3] |
BAI Kai-feng, ZHAO Hong-bin, ZHANG Yun, LI Yan, CUI Jing-an, LIU Qian-jin, YANG Hua, NI Na.
Review of Abnormal Service Data Detection Methods in Power Grid
[J]. Computer and Modernization, 2023, 0(03): 79-83.
|
[4] |
WU Yang1, WU Guo-wen1, ZHANG Hong1, SHEN Shi-gen2, CAO Qi-ying.
Rumor Source Detection Based on Extended Epidemic Model
[J]. Computer and Modernization, 2022, 0(01): 113-119.
|
[5] |
GE Bin, CHEN Gang, FANG Rui, LIAO Zhong-zhi.
A Novel Hyper Chaotic Image Encryption Algorithm Using Four Directional Diffusion Based on Matrix
[J]. Computer and Modernization, 2021, 0(06): 113-119.
|
[6] |
WU Hai-wei, WANG Xiao-zhong, ZHU Fa-shun, .
A Scheduling Method of Smart Grid Based on Genetic Algorithm
[J]. Computer and Modernization, 2020, 0(09): 122-126.
|
[7] |
YANG Yong-jiao, XIAO Jian-yi, ZHAO Chuang-ye, ZHOU Kai-dong.
An Anomaly Detection Algorithm for Smart Grid Time Series Data #br# Based on Combination of Isolation Forest and Random Forest
[J]. Computer and Modernization, 2020, 0(03): 99-.
|
[8] |
YANG Yong-jiao, TANG Liang-liang.
An Anomaly Detection Method for Network Traffic of Servers #br# in Smart Grid Based on Deep Encoder-Decoder Neural Network
[J]. Computer and Modernization, 2019, 0(10): 66-.
|
[9] |
ZHANG Su-ning, WANG Yue-juan, WU Shui-ming, JING Dong-sheng.
Network Intrusion Data Clustering Algorithm Based on Krylov Subspace
[J]. Computer and Modernization, 2019, 0(10): 121-.
|
[10] |
YANG Yong-jiao, QIU Yu, ZHAN Li-chao.
An Anomaly Detection Approach on Servers Traffic in Smart #br# Grid Based on Breadth Learning Algorithm
[J]. Computer and Modernization, 2019, 0(09): 77-.
|
[11] |
YE Qian1,WANG Yu-fei2,FU Yi3,TANG Yu-lan1.
GQM-based Risk Assessment Method for Industrial Control Systems
[J]. Computer and Modernization, 2019, 0(08): 92-.
|
[12] |
HUANG Yujie, TANG Zuoqi.
Information Security Risk Assessment Based on Improved Bayesian Network Model
[J]. Computer and Modernization, 2018, 0(04): 95-.
|
[13] |
PING Ping, HUANG Li-lin, MAO Ying-chi, XU Guo-yan.
Image Encryption Algorithm Based on Life-like Cellular Automaton
[J]. Computer and Modernization, 2017, 0(10): 95-99.
|
[14] |
LIU Zhi-yong1, WANG Hong-kai2, LI Gao-lei3, WU Jun3, SU Ya-ting1.
A Dynamic Recognition System of Unknown Malicious Programs Based on Host Characteristics
[J]. Computer and Modernization, 2016, 0(3): 105-110.
|
[15] |
YU Hao1, JIA Xue1, WANG Qiang2.
Research on Safety Protection Strategy of Smart Substation Application Layer Data Encryption
[J]. Computer and Modernization, 2016, 0(2): 82-85.
|