A vulnerability scanning and verification system for power information systems.
Lixiang ShenLijin WuJingdong GuoWenliang LiuWen JiQian ChenPublished in: AIIPCC (2022)
Keyphrases
- information systems
- power consumption
- information technology
- face verification
- model checking
- functional verification
- business management
- support systems
- network security
- project management
- genetic algorithm
- health care
- information security
- image processing
- e learning
- social networks
- signature verification
- power distribution
- data sets
- scan data
- real time