Meijiao Xu, Wei Ji, and Wei Zhang
[1] Z. Liang, Q. Gang, L. Huixing, and J. Haochun, Research andapplication on key technologies of network security situationawareness platform of smart grid power monitoring system.Journal of Shanghai Jiaotong University, 55(S2), 2021, 103–109. [2] W. Jie, Z. Zhiming, and L. Chengbo, Research on perceptionof advanced persistent threat in power monitoring system,Advances of Power System Hydroelectric Engineering, 36(5),2020, 64–68+74. [3] S. Yiding and L. Qiang. Towards discovering compromisedhosts with temporal-spatial behaviours in advanced persistentthreats, Application Research of Computers, 39(6), 2022, 1860–1864. [4] C. Yachuang, Y. Wenzhong, Z. Zhihao, H. Zhiquan, D.Huixiang, and Q. Yunyun, Unsupervised host intrusiondetection method based on EKM-AE model. Journal of ChineseComputer Systems, 42(4), 2021, 868–874. [5] Y. Hongyu, Y. Haihang, and Z. Liang, Host security assessmentmethod based on attack graph, Journal on Communications,43(2), 2022, 89–99. [6] P. Mundra, A. Arya, S.K. Gawre, Assessing the impactof renewable purchase obligation on Indian power sector,International Journal of Power and Energy Systems, 40(4),2020. [7] L. Xuyang, N. Xin, H. Junxing, Y. Junfeng, and M. Han,Ensemble learning based malware detection method for smartgird. Journal of Chongqing University (Natural ScienceEdition), 44(3), 2021, 144–150. [8] Y. Hongyu, Y. Haihang, and Z. Liang, A risk assessmentmethod of network host node with host importance. Journalof Beijing University of Posts and Telecommunications, 45(2),2022, 16–21. [9] Yangliuqing and W. Chong, Aload prediction basedphysical host status detection strategy in cloud datacenters, Journal of Chongqing University of Posts andTelecommunications (Natural Science Edition), 33(6), 2021,1014–1023. [10] D. Wei, Network security threat prevention and controlsystem of electric power monitoring systems for wind farm.Telecommunications Science, 36(5), 2020, 138–144. [11] Q. Shengpan, Y. Yang, Z. Tianyi, Z. Xudong, and C.Yanbo, Research on online prediction model of host loadbased on deep learning. Computer Engineering, 47(9), 2021,84–89. [12] G. Dezhi, X. Gan, High-dimensional mixed attribute datamining method based on K-means clustering algorithm.Computer Simulation, 38(2), 2021, 308–312. [13] L. Rong, and Z. Siwang, Power monitoring system based oncompressive sensing. Control Engineering of China, 26(5),2019, 952–956. [14] Y. Gang, Y. Yali, L. Hua, R. Dongwu, H. Junfe, andW. Fang, Development and application of reference dataavalanche automatic test system of smart substation monitoringsystem, Power System Protection and Control, 47(18), 2019,182–187. [15] L. Junwei, T. Yafang, H. Zhenghang, M. Guolong, and J.Youquan, Survey of cluster analysis and its application inpower system, Modern Electric Power, 36(3), 2019, 1–10. [16] Y. Zhiyuan, Z. Shipeng, S. Hao, and G.Xiohong, Risk estimationof cyber threat to substation based on cyber-net and learningalgorithm. Automation of Electric Power Systems, 44(24),2020, 19–27. [17] Z. Ying, W. Bin, and T. Ningshan. Risk assessment of powermonitoring system based on cloud model and improved evidencetheory. Computer Systems Applications, 31(8), 2022, 55–63. [18] A.A. Dubov, Risk monitoring based on early diagnosis ofpotential damage to power equipment, Thermal Engineering,68(9), 2021, 730–734. [19] H. Li, T. Li, Q. Yao, W. Li, L. Yang, and G. Sun, Risk assessmentof power monitoring system based on fuzzy analytical hierarchyprocess, Journal of Physics: Conference Series, 2137(1), 2021,012023. [20] A. Hooshyar, Guest editorial special issue on resilience-orientedprotection, control, and monitoring systems for power grids,IEEE Transactions on Power Delivery, 36(4), 2021, 2251–2252. [21] S. Mor, N. Vig, and K. Ravindra, Distribution of heavy metalsin surface soil near a coal power production unit: Potentialrisk to ecology and human health, Environmental monitoringand assessment, 194(4), 2022, 263. [22] O. Behr, K. Barre, F. Bontadina, R. Brinkmann, M. Dietz, T.Disca, J. S. P. Froidevaux, S. Ghanem, S. Huemer, J. Hurst, S.K. Kaminsky, V. Kelm, F. Korner-Nievergelt, M. Lauper, P.Lintott, C. Newman, T. Peterson, J. Proksch, C. Roemer, W.Schorcht, and M. Nagy, Standardised and referenced acousticmonitoring reliably estimates bat fatalities at wind turbines:Comments on ‘Limitations of acoustic monitoring at windturbines to evaluate fatality risk of bats’, Mammal Review,53(2), 2023, 65–71. [23] M. Ahmad and R. Mohd-Mokhtar, Design of H-/H8 based faultdetection filter for linear uncertain systems using linear matrixinequalities, International Journal of Robotics and Automation,14(2), 2025, 214–226. [24] N.I.M. Azmi, and N. M. Yahya, Position tracking ofDC motor with PID controller utilizing particle swarmoptimization algorithm with Lvy flight and Doppler effect,International Journal of Robotics and Automation, 14(1), 2025,67–73.9
Important Links:
Go Back