期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于云边协同的数字电网通信信息网络安全策略研究 被引量:2
1
作者 黄翔 刘晓静 +4 位作者 吴文鹏 陈英达 林克全 梁国鹏 梅超宇 《电力大数据》 2023年第10期42-49,共8页
随着科技的发展和社会的进步,电力信息网络数据交互将变得更加开放,电网控制系统应用场景更为复杂,如果没有信息网络安全作保障,那么泛在电力物联网建设将无从谈起。结合目前电网安全形势,本研究旨在探讨基于云边协同的数字电网通信信... 随着科技的发展和社会的进步,电力信息网络数据交互将变得更加开放,电网控制系统应用场景更为复杂,如果没有信息网络安全作保障,那么泛在电力物联网建设将无从谈起。结合目前电网安全形势,本研究旨在探讨基于云边协同的数字电网通信信息网络安全策略。首先,通过大量文献分析、调查问卷等方法,确定了数字电网通信信息网络面临的主要安全威胁和保障需求。其次,在此基础上提出以云边协同为核心的网络安全保障策略,包括资源共享、实时监测、数据加密等多层次的解决方案。然后,本文从安全性、可靠性和易用性三个角度对该策略进行评价,并通过仿真实验验证了其有效性和可行性。结论表明,基于云边协同的数字电网通信信息网络安全策略可以有效地提高数字电网的安全性和稳定性,具有很强的实际应用价值。 展开更多
关键词 数字电网 通信信息网络安全 云边协同 数据加密 资源共享
下载PDF
Research and improvement on packet capture mechanism in linux for high-speed network 被引量:2
2
作者 杨武 方滨兴 +1 位作者 云晓春 张宏莉 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第5期494-498,共5页
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu... With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network. 展开更多
关键词 high-speed network packet capture TCP/IP protocol stack performance bottleneck LKM
下载PDF
Analysis on the Security Enhancement Model of Communication System based on Chaotic Encryption and Analytic Hierarchy Process
3
作者 Qianfei Huang 《International Journal of Technology Management》 2016年第10期28-30,共3页
In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by... In this paper, we conduct research on the security enhancement model of communication system based on the chaotic encryption and analytic hierarchy process. The communication of the information network is completed by the communication protocol. The communication protocol can be divided into application layer, transport layer, network layer, link layer and physical layer. By using the communication protocol, the security control of the network communication can meet the needs of the information network security communication. This paper integrates the chaos system to further implement the robust system architecture. The algorithm of this paper tries to make the maximum value of the above three parameters in each iteration step by step and the output feedback to dynamically change these parameters. Compared with other algorithms, our method can adopt more related theories to perform the better result. 展开更多
关键词 Security Enhancement Communication System Chaotic Encryption Analytic Hierarchy Process
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部