This work is licensed under the Creative Commons Attribution 4.0 International License.
Wang CH, Chiou YC. (2016). Alert correlation system with automatic extraction of attack strategies by using dynamic feature weights. Int’l Journal of Computer and Communication Engineering, 5(1), 1-10.Search in Google Scholar
P. Liu, X. Jia, S. Zhang, X. Xiong, Y. C. Jhi, K. Bai, and J. Li. (2016). Cross-Layer Damage Assessment for Cyber Situational Awareness. Advances in Information Security, 46, 155-176.Search in Google Scholar
Wang Y, Zhao K, Guirao J L G, et al. (2022). Online intelligent maneuvering penetration methods of missile with respect to unknown intercepting strategies based on reinforcement learning. Electronic Research Archive, 30(12), 4366-4381.Search in Google Scholar
P. Li, L. Liu, J. L. Xu, et al. (2017). Application of Hidden Markov Model in SQL Injection Detection.2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), 02, 578–583.Search in Google Scholar
Chen Z, Yan L, Z Lü, et al. (2021). Research on Zero-trust Security Protection Technology of Power IoT based on Blockchain. Journal of Physics: Conference Series, 1769(1), 012039-012046.Search in Google Scholar
Li Y, Liu S, Liang Y, et al. (2021). Technology Research on Panoramic Situation Awareness of Operation State of Smart Distribution Network. IOP Conference Series: Earth and Environmental Science, 645(1), 012007-012013.Search in Google Scholar
Liu X, Zhang H, Zhang Y, et al. (2020). Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game. Security and Communication Networks, 1-11.Search in Google Scholar
Frayssinet, M., Esenarro, D., Juárez, F. F., y Díaz, M. (2021). Methodology based on the NIST cybersecurity framework as a proposal for cybersecurity management in government organizations. 3C TIC. Cuadernos de desarrollo aplicados a las TIC, 10(2), 123-141. https://doi.org/10.17993/3ctic.2021.102.123-141.Search in Google Scholar
gaoyu. (2022). App1ication of network security situationa1 awareness in power infonnation system security. IOP Publishing Ltd.Search in Google Scholar
Liu H, Guan Y, Liu Y, et al. (2019). Research on network security situation awareness of electric power dispatching system. Electrical Measurement & Instrumentation.Search in Google Scholar
Huang K, Yang X, Ke X U, et al. (2019). Network Security Situation Analysis of Large Power Grid Enterprises Based on Multi-Dimensional Heterogeneous Model. Electric Power Information and Communication Technology.Search in Google Scholar
Liang Y, Zhang L, Wang S, et al. (2021). Research on Network Threat and Situation Assessment Method of Electric Power Information System. Journal of Physics: Conference Series, 1883(1), 012105-012111.Search in Google Scholar
Ma W Z, Xu M C. (2020). Design of Border Security Defense System for VPN Network in Power Enterprises. Journal of Physics Conference Series, 1617, 012011.Search in Google Scholar
Zhu W, Liu X, Tian H, et al. (2018). Method of Main Grid Online Security Situation and Operational Experience Acquisition. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 38(22), 6605-6615.Search in Google Scholar
Lou C, Yang J, Li T, et al. (2020). New phase-changing soft open point and impacts on optimising unbalanced power distribution networks. IET generation, transmission & distribution, 14-23.Search in Google Scholar
Tang B, Zhang Y, Zhang Z. (2018). Research on the current situation and countermeasures of Chinaese network security governance in the context of network power. Wireless Internet Technology.Search in Google Scholar
Sabir Z, Raja M A Z, Guirao J L G, et al. (2020). A neuro-swarming intelligence-based computing for second order singular periodic non-linear boundary value problems. Frontiers in Physics, 8, 224. https://doi.org/10.3389/fphy.2020.00224Search in Google Scholar