Author of the publication

Security situation awareness method of power mobile application based on big data architecture.

, , , and . DSIT, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on 5G-Based Zero Trust Network Security Platform., , , , , and . ICBDS, volume 1796 of Communications in Computer and Information Science, page 552-563. Springer, (2022)Research on Power Mobile Internet Security Situation Awareness Model Based on Zero Trust., , , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 507-519. Springer, (2022)Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework., , , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 612-624. Springer, (2022)Trust Evaluation Based on Variable Weight Synthesis., , , , and . HPCC/DSS/SmartCity/DependSys, page 1685-1692. IEEE, (2021)Trust Evaluation Method Based on the Degree of Code Obfuscation., , , and . SmartCom, volume 13202 of Lecture Notes in Computer Science, page 164-174. Springer, (2021)Identity Identification of Power Intelligent Terminals Based on Behavior Modeling., , , , , and . ISCSIC, page 50-54. IEEE, (2022)Security situation awareness method of power mobile application based on big data architecture., , , and . DSIT, page 1-6. IEEE, (2022)FedTag: Towards Automated Attack Investigation Using Federated Learning., , , and . IAIC (1), page 112-126. (2023)