Risk Assessment of Electric Energy Metering Automation System Based on Bayesian Network

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (8. : 2022 : Qinghai) Artificial intelligence and security ; Part 3
1. Verfasser: Li, Weihua (VerfasserIn)
Weitere Verfasser: Wu, Shaocheng (VerfasserIn), Ma, Yue (VerfasserIn), Liu, Tao (VerfasserIn), Bai, Yali (VerfasserIn), Zuo, Jinxin (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Multi-objective Dual-Route Planning Algorithm for Grid Communication Network 2022 Gou, Xiaojun
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy 2022 Feng, Xiao
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing 2022 Jiang, Qiulu
An Efficient Certificate-Based Encryption Scheme Without Random Oracles 2022 Guo, Lan
A Rational Hierarchical Quantum State Sharing Protocol 2022 Zhang, Huali
Multi-carrier Steganography Algorithm Based on Executable Program 2022 Tian, Zuwei
Robust Video Watermarking Using Normalized Zernike Moments 2022 Chen, Shiyi
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption 2022 Lai, Ruopan
Noise Simulation-Based Deep Optical Watermarking 2022 Wang, Feng
Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework 2022 Li, Yong
Simulation Research on Iron Core Air Gap of Energy-Taking Current Transformer (CT) Based on Ansys 2022 Yu, Pingping
Dark Chain Detection Based on the IP Address 2022 Fang, Jingwen
Energy Efficiency Maximization for UAV and Electric Vehicle Assisted Mobile Edge Computing on the Edge Side 2022 Tang, Qiang
High-Reliability Mapping Algorithm Based on Network Topology Characteristics in Network Slicing Environment 2022 Zou, Zhonglu
Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM Algorithm 2022 Gan, Wei
Distributed State Estimation for Topology Random Switching in Sensor Networks 2022 Yan, Peng
A Survey on Ethereum Illicit Detection 2022 Li, Meng
Research on Video Falsity Detection Based on Publisher and Publishing Environment Features 2022 Xiao, Xvhao
Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRP 2022 Shi, Jing
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios 2022 Pu, Huailin
Alle Artikel auflisten