[1] 彭维平, 郭凯迪, 宋成, 等. 面向外包数据的可追踪防泄漏访问控制方案[J]. 计算机工程与应用, 2020, 56(6): 117–125 PENG Weiping, GUO Kaidi, SONG Cheng, et al. Traceable leak prevention access control scheme for outsourced data[J]. Computer Engineering and Applications, 2020, 56(6): 117–125 [2] 刘格昌, 李强. 基于可搜索加密的区块链数据隐私保护机制[J]. 计 算机应用, 2019, 39(增刊2): 140–146 LIU Gechang, LI Qiang. Blockchain data privacy protection mechanism based on searchable encryption[J]. Journal of Computer Applications, 2019, 39(S2): 140–146 [3] 陈孝莲, 虎啸, 沈超, 等. 基于区块链的电力物联网接入认证技术研究[J]. 电子技术应用, 2019, 45(11): 77–81 CHEN Xiaolian, HU Xiao, SHEN Chao, et al. Research on access authentication technology of power IoT based on Blockchain[J]. Application of Electronic Technique, 2019, 45(11): 77–81 [4] 黄利军, 翟登辉, 李瑞生, 等. 未来多源农村配电网安全与防护技术研究与探讨[J]. 电力系统保护与控制, 2019, 47(2): 167–174 HUANG Lijun, ZHAI Denghui, LI Ruisheng, et al. Research and discussion on safety and protection technology of distribution network in rural areas in the future[J]. Power System Protection and Control, 2019, 47(2): 167–174 [5] 王辉, 郝丽丽, 黄梅, 等. 基于历史故障信息的配电网设备故障概率建模[J]. 电力自动化设备, 2020, 40(3): 76–84 WANG Hui, HAO Lili, HUANG Mei, et al. Failure probability model of distribution network equipment based on historical fault information[J]. Electric Power Automation Equipment, 2020, 40(3): 76–84 [6] 郑秀杰, 董彬彬, 易建波. 电网量测数据海量终端的前置中间件技术研究[J]. 电测与仪表, 2020, 57(1): 70–75 ZHENG Xiujie, DONG Binbin, YI Jianbo. Research on pre- middleware technology for massive terminal of power grid measurement data[J]. Electrical Measurement & Instrumentation, 2020, 57(1): 70–75 [7] 邓阿妹, 魏凤, 牟乾辉, 等. 基于专利分析的电网雷电防护技术发展研究[J]. 高压电器, 2019, 55(9): 78–85 DENG Amei, WEI Feng, MU Qianhui, et al. Research on development of lightning protection technology for power grid based on patent analysis[J]. High Voltage Apparatus, 2019, 55(9): 78–85 [8] 杜晓东, 赵建利, 刘科研, 等. 基于数字孪生的光伏高比例配电网过载风险预警方法[J]. 电力系统保护与控制, 2022, 50(9): 136–144 DU Xiaodong, ZHAO Jianli, LIU Keyan, et al. Digital twin early warning method study for overload risk of distribution network with a high proportion of photovoltaic access[J]. Power System Protection and Control, 2022, 50(9): 136–144 [9] 李晓露, 左璇, 刘日亮, 等. 基于形状约束语言的电网模型知识图谱验证方法[J]. 中国电力, 2022, 55(1): 119–125, 228 LI Xiaolu, ZUO Xuan, LIU Riliang, et al. SHACL-based validation method of knowledge graph for power system model[J]. Electric Power, 2022, 55(1): 119–125, 228 [10] 陈德成, 付蓉, 宋少群, 等. 基于攻击图的电网信息物理融合系统风险定量评估[J]. 电测与仪表, 2020, 57(2): 62–68 CHEN Decheng, FU Rong, SONG Shaoqun, et al. Quantitative risk assessment for cyber physical power system based on attack graph[J]. Electrical Measurement & Instrumentation, 2020, 57(2): 62–68 [11] 张彬桥, 葛苏叶, 李成. 基于Copula函数的马尔科夫链风速预测模型[J]. 智慧电力, 2021, 49(11): 24–30, 37 ZHANG Binqiao, GE Suye, LI Cheng. Markov chain wind speed prediction model based on copula function[J]. Smart Power, 2021, 49(11): 24–30, 37 [12] 申扬, 于海, 尹晓华. 基于机器学习的电网信息通信服务器智能优化[J]. 科学技术与工程, 2020, 20(32): 13302–13308 SHEN Yang, YU Hai, YIN Xiaohua. Intelligent optimization of information communication server of power grid based on machine learning[J]. Science Technology and Engineering, 2020, 20(32): 13302–13308 [13] 安宇, 刘东, 陈飞, 等. 考虑信息攻击的配电网信息物理运行风险分析[J]. 电网技术, 2019, 43(7): 2345–2352 AN Yu, LIU Dong, CHEN Fei, et al. Risk analysis of cyber physical distribution network operation considering cyber attack[J]. Power System Technology, 2019, 43(7): 2345–2352 [14] 李勃, 张孝军, 徐宇新, 等. 基于本地信息的有限选择性直流微电网保护方案[J]. 智慧电力, 2021, 49(1): 48–55 LI Bo, ZHANG Xiaojun, XU Yuxin, et al. Protection scheme with limited selectivity for DC microgrid based on local measurements[J]. Smart Power, 2021, 49(1): 48–55 [15] 石赫, 杨群, 刘绍翰, 等. 基于深度学习的电网故障预案信息抽取研究[J]. 计算机科学, 2020, 47(增刊2): 52–56 SHI He, YANG Qun, LIU Shaohan, et al. Study on information extraction of power grid fault emergency pre-plans based on deep learning[J]. Computer Science, 2020, 47(S2): 52–56 [16] 邓科, 张丽红, 蔡昂, 等. 基于分级调度算法的交换机路由信息处理技术[J]. 电网与清洁能源, 2020, 36(1): 8–13 DENG Ke, ZHANG Lihong, CAI Ang, et al. Routing information processing technology of switch based on hierarchical scheduling algorithm[J]. Power System and Clean Energy, 2020, 36(1): 8–13 [17] 陈碧云, 陆智, 李滨. 计及多类型信息扰动的配电网可靠性评估[J]. 电力系统自动化, 2019, 43(19): 103–110 CHEN Biyun, LU Zhi, LI Bin. Reliability assessment of distribution network considering multiple types of information disturbances[J]. Automation of Electric Power Systems, 2019, 43(19): 103–110 [18] 张玉磊, 骆广萍, 张永洁, 等. 基于格式保留的敏感信息加密方案[J]. 计算机工程与科学, 2020, 42(2): 236–240 ZHANG Yulei, LUO Guangping, ZHANG Yongjie, et al. A format preserving encryption scheme for sensitive information[J]. Computer Engineering & Science, 2020, 42(2): 236–240 [19] 韩雪娟, 李国东, 王思秀. 基于Logistic和超混沌结合的加密算法[J]. 计算机科学, 2019, 46(增刊2): 477–482 HAN Xuejuan, LI Guodong, WANG Sixiu. Cryptographic algorithm based on combination of logistic and hyperchaos[J]. Computer Science, 2019, 46(S2): 477–482 [20] 赵建, 高海英, 胡斌. 基于容错学习的属性基加密方案的具体安全性分析[J]. 电子与信息学报, 2019, 41(8): 1779–1786 ZHAO Jian, GAO Haiying, HU Bin. Analysis method for concrete security of attribute-based encryption based on learning with errors[J]. Journal of Electronics & Information Technology, 2019, 41(8): 1779–1786 [21] 李嘉睿, 凌晓波, 李晨曦, 等. 基于贝叶斯攻击图的动态网络安全分析[J]. 计算机科学, 2022, 49(3): 62–69 LI Jiarui, LING Xiaobo, LI Chenxi, et al. Dynamic network security analysis based on Bayesian attack graphs[J]. Computer Science, 2022, 49(3): 62–69 [22] 张凯, 刘京菊. 一种基于知识图谱的威胁路径生成方法[J]. 计算机仿真, 2022, 39(4): 350–356 ZHANG Kai, LIU Jingju. A threat path generation method based on knowledge graph[J]. Computer Simulation, 2022, 39(4): 350–356 [23] 陈泽, 董娜, 钟式玉, 等. 基于知识图谱的电网安全漏洞扩展攻击图研究[J]. 信息技术, 2022, 46(2): 30–35 CHEN Ze, DONG Na, ZHONG Shiyu, et al. Research on the network security vulnerability expansion attack graph based on knowledge map[J]. Information Technology, 2022, 46(2): 30–35 [24] 杨宏宇, 袁海航, 张良. 基于攻击图的主机安全评估方法[J]. 通信学报, 2022, 43(2): 89–99 YANG Hongyu, YUAN Haihang, ZHANG Liang. Host security assessment method based on attack graph[J]. Journal on Communications, 2022, 43(2): 89–99 [25] 刘祥, 杨永强. 基于多信息融合的网络通信威胁智能识别方法[J]. 自动化与仪器仪表, 2021(9): 75–78 LIU Xiang, YANG Yongqiang. Intelligent identification method of network communication threat based on multi-information fusion[J]. Automation & Instrumentation, 2021(9): 75–78
|