Mining Network Security Holes Based on Data Flow Analysis in Smart Grid.
Yang LiXiaohua LiuLixin ZhangWenbin GuoQian GuoPublished in: SGIoT (2019)
Keyphrases
- network security
- smart grid
- flow analysis
- data analysis
- intrusion detection
- data mining techniques
- data collection
- computer systems
- database
- knowledge discovery
- machine learning
- cyber security
- data processing
- cloud computing
- mobile devices
- intrusion detection system
- information security
- information systems
- security policies
- data mining