Context information based cyber security defense of protection system

被引:0
|
作者
Su, Sheng [1 ]
Duan, Xianzhong [1 ]
Zeng, Xiangjun [2 ]
Chan, W. L. [3 ]
Li, K. K. [3 ]
机构
[1] Huazhong Univ Sci & Technol, Wuhan 430074, Peoples R China
[2] Changsha Univ Sci & Technol, Changsha, Hunan, Peoples R China
[3] Hong Kong Polytech Univ, Kowloon, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:294 / 294
页数:1
相关论文
共 50 条
  • [1] Context information-based cyber security defense of protection system
    Sheng, Su
    Chan, W. L.
    Li, K. K.
    Duan Xianzhong
    Zeng Xiangjun
    IEEE TRANSACTIONS ON POWER DELIVERY, 2007, 22 (03) : 1477 - 1481
  • [2] Leveraging Information Security Continuous Monitoring for Cyber Defense
    AlSadhan, Tina
    Park, Joon
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 401 - 408
  • [3] Design of A Game Theory Based Defense System for Power System Cyber Security
    Ni, Ming
    Srivastava, Anurag K.
    Bo, Rui
    Yan, Jie
    2017 IEEE 7TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2017, : 1049 - 1054
  • [4] Cyber Attack Defense: DID-based Email Security System
    Oh, Han-Su
    Kim, Ki-Hyung
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 807 - 811
  • [5] Security defense of information system based on artificial immunology
    Xiao, Yi
    Xiao, Ming
    Zhao, Hui
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 960 - 966
  • [6] Computer Multimedia Security Protection System Based on the Network Security Active Defense Model
    Shang, Yanhong
    Zhang, Jing
    Zhang, Jing (2016120252@jou.edu.cn), 1600, Hindawi Limited (2021):
  • [7] A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat
    Zhu B.
    Guo Y.
    Guo C.
    Jiang Z.
    Zhang X.
    Yuan X.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (01): : 178 - 187
  • [8] Managing Information Technology Security in the Context of Cyber Crime Trends
    Neghina, D.
    Scarlat, E.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2013, 8 (01) : 97 - 104
  • [9] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [10] A METAGRAPH MODEL OF CYBER PROTECTION OF AN INFORMATION SYSTEM
    Koleva, Emiliya
    Andreev, Evgeni
    Nikolova, Mariya
    MATHEMATICS AND INFORMATICS, 2022, 65 (02): : 201 - 211