October 2023
·
2 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
October 2023
·
2 Reads
December 2020
·
13 Reads
Lecture Notes of the Institute for Computer Sciences
With the rapid development of the mobile internet, the volume of data has grown exponentially, and the content of data become more complicated. It is hard for people to select useful information from such a large number of data. In this paper, we study the problem of approximate sub-graph matching over knowledge graph. We first propose two algorithms to reduce the scale of knowledge graph. Next, we use an efficient algorithm to find similarity sub-graphs. Thirdly, we use skyline technique to further select high quality sub-graphs from the matching results. Theoretical analysis and extensive experimental results demonstrate the effectiveness of the proposed algorithms.
December 2020
·
17 Reads
Lecture Notes of the Institute for Computer Sciences
With the development of 5G, network attacking becomes more and more easy. Many system vulnerability are utilized to be attacked via 5G technology. It leads that the network attack frequency turn to high, and the network attack strength turns to strong. Among all network attack identification methods, outlier detection is one of the most important one. It aims to find data which is much different from most of the others. In this paper, we propose an outlier detection based framework to support network-attack identification. It first uses a novel algorithm to construct core point set so as support efficiently outlier detection. Next, it uses a novel index named ZB-Tree to manage these core points. Thirdly, we propose a predictive IP-table to handle and predict suspicious IP addresses. In this way, we could identify most suspicious IP addresses based on the position relationships among different base stations. Theoretical analysis and extensive experimental results demonstrate the effectiveness of the proposed algorithms.
April 2019
·
395 Reads
·
5 Citations
Journal of Physics Conference Series
This paper introduces various concepts that relate to information technology and the development of energy transmission and distribution. Key challenges need to be addressed in relation to energy consumption, such as the need to be responsive to current demand, which have been addressed through information technology systems. With the increased connectedness of energy systems, there has also been an increased need to ensure the information security of these systems. The Internet of Things (IoT) concept will be reviewed in relation to the connection of objects in energy systems as well as the concepts of Big Data and Cloud Computing. The former has developed in response to the need to predict energy usage more accurately and the latter offers the advantages of increased failover potential as well as much faster provisioning of enhanced capacity in IT systems to meet consumer demand.
... Attacks targeting supervisory control and data acquisition SCADA-controlled switching devices or monitoring devices impeding situational awareness (in an integrated T&D system model) are evaluated in [38]. The authors in [19], investigated cyber-attacks on IoT-enabled grid deployments. They discuss how advancements in IoT technologies can drive the power grid modernization process, but at the same time increase the system's threat surface given its interconnected topology encompassing millions of IoT nodes. ...
April 2019
Journal of Physics Conference Series