×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [4]
沈阳自动化研究所 [3]
北京航空航天大学 [2]
兰州理工大学 [1]
西安交通大学 [1]
兰州大学 [1]
更多...
内容类型
期刊论文 [12]
会议论文 [1]
发表日期
2023 [1]
2022 [3]
2021 [1]
2020 [2]
2019 [1]
2018 [3]
更多...
学科主题
science & ... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain-Based Water-Energy Transactive Management With Spatial-Temporal Uncertainties
期刊论文
IEEE TRANSACTIONS ON SMART GRID, 2023, 卷号: 14, 期号: 4, 页码: 2903-2920
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Gu, Chenghong
;
Lu, Shuai
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/11/17
Blockchain
spatial-temporal ambiguity set
two-stage framework
water-energy nexus
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement
期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Cao, Zhidong
;
Gu, Chenghong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/11/14
Transportation
Computer crime
Renewable energy sources
Smart cities
Vehicle-to-grid
Uncertainty
Turbines
Cyber-attack
cyber security
electric vehicle
false data injection attacks
multi-energy system
smart city manage-ment
social effort
Cyber-Resilient Multi-Energy Management for Complex Systems
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 卷号: 18, 期号: 3, 页码: 2144-2159
作者:
Zhao, Pengfei
;
Cao, Zhidong
;
Zeng, Dajun
;
Gu, Chenghong
;
Wang, Zhaoyu
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2022/01/27
Indexes
Cogeneration
Uncertainty
Reactive power
Pipelines
Optimization
Natural gas
Cyberattacks
distribution systems
energy hubs
load redistribution (LR) attacks
multienergy systems
real-time operation
resilience enhancement
Distributed Fault-Tolerant Consensus Tracking of Multi-Agent Systems Under Cyber-Attacks
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 6, 页码: 1037-1048
作者:
Chun Liu
;
Bin Jiang
;
Xiaofan Wang
;
Huiliao Yang
;
Shaorong Xie
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/05/30
Cyberattacks
fault-tolerant consensus tracking
incipient and abrupt actuator faults
nonlinear multi-agent systems
unknown input observer
Group signature with time-bound keys and unforgeability of expiry time for smart cities
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1
作者:
Fang, Junli
;
Feng, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Group signatures
Unforgeability of expiry time
Time-bound keys
Internet of things
Smart cities
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
作者:
Liang W(梁炜)
;
Xia XF(夏小芳)
;
Xiao Y(肖杨)
收藏
  |  
浏览/下载:168/0
  |  
提交时间:2019/10/10
Smart grid
electricity theft
suspicion assessment
malicious meter inspection
security
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
作者:
Xia XF(夏小芳)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2019/10/10
Smart grid
electricity theft
suspicion assessment
malicious meter inspection
security
An extended intelligent driver model to describe the impact of cyberattacks on connected vehicles
会议论文
19th COTA International Conference of Transportation Professionals: Transportation in China - Connecting the World, CICTP 2019, Nanjing, China, 2019-07-06
作者:
Wang, Sifeng
;
Gao, Haer
;
Yu, Guizhen
;
Wang, Pengcheng
;
Li, Honggang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
Preventing state-led cyberattacks using the bright internet and internet peace principles
期刊论文
Journal of the Association of Information Systems, 2018, 卷号: 19, 页码: 152-181
作者:
Shin, Young Yung
;
Lee, Jae Kyu
;
Kim, Myungchul
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/26
Cyber security
Cyber-attacks
Cyberspaces
Member countries
Non-proliferation of nuclear weapons
United Nations
Cyberattacks on Devices Threaten Data and Patients: Cybersecurity Risks Come with the Territory. Three Experts Explain What You Need to Know
期刊论文
IEEE Pulse, 2018, 卷号: Vol.9 No.3, 页码: 25-28
作者:
LeslieMertz
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/24
Computer
hacking
Privacy
Computer
security
Medical
diagnostic
imaging
Medical
services
Patient
monitoring
Electronic
medical
records
Medical
information
systems
©版权所有 ©2017 CSpace - Powered by
CSpace