{"title":"电力监控系统网络安全现状研究与技术探索","authors":"Lulu Wang, Zhijun Wang","doi":"10.62051/96h2c650","DOIUrl":null,"url":null,"abstract":"This paper analyzes the current situation of the network security of the power monitoring system, and discusses the weak link in the network security protection of the power monitoring system from the perspective of technical exploration. From the perspective of application, the application of trusted computing technology and malicious code technology in the security protection system of power monitoring system is discussed, so as to further ensure the network security of power monitoring system.","PeriodicalId":509968,"journal":{"name":"Transactions on Computer Science and Intelligent Systems Research","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research On the Current Situation and Technical Exploration of Network Security in Power Monitoring System\",\"authors\":\"Lulu Wang, Zhijun Wang\",\"doi\":\"10.62051/96h2c650\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper analyzes the current situation of the network security of the power monitoring system, and discusses the weak link in the network security protection of the power monitoring system from the perspective of technical exploration. From the perspective of application, the application of trusted computing technology and malicious code technology in the security protection system of power monitoring system is discussed, so as to further ensure the network security of power monitoring system.\",\"PeriodicalId\":509968,\"journal\":{\"name\":\"Transactions on Computer Science and Intelligent Systems Research\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Computer Science and Intelligent Systems Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.62051/96h2c650\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Computer Science and Intelligent Systems Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.62051/96h2c650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research On the Current Situation and Technical Exploration of Network Security in Power Monitoring System
This paper analyzes the current situation of the network security of the power monitoring system, and discusses the weak link in the network security protection of the power monitoring system from the perspective of technical exploration. From the perspective of application, the application of trusted computing technology and malicious code technology in the security protection system of power monitoring system is discussed, so as to further ensure the network security of power monitoring system.