Open Access
ARTICLE
Jiyu Zhang1,*, Kehe Wu1, Ruomeng Yan1, Zheng Tian2, Yizhen Sun2, Yuxi Wu2, Yaogong Guo3
1 Department of Control and Computer Engineering, North China Electric Power University, Beijing, 102206, China
2 State Grid Information & Communication Company of Hunan Electric Power Corporation, Changsha, 410118, China
3 State Grid Hunan Electric Power Corporation Chenzhou Power Supply Branch, Chenzhou, 423000, China
* Corresponding Author: Jiyu Zhang. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.055243
Received 21 June 2024; Accepted 28 October 2024; Published online 18 November 2024
View
Download
Like
New Method for Computer Identification Through Electromagnetic Radiation
Jun Shi, Zhujun Zhang, Yangyang...RETRACTED: Mitigating Content Caching Attack in NDN
Zhiqiang Ruan, Haibo Luo, Wenzhong...Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
Daofeng Li, Mingxing Luo, Bowen...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...Automatic Mining of Security-Sensitive Functions from Source Code
Lin Chen, Chunfang Yang, Fenlin...