Buscar
Mostrando ítems 1-10 de 6101
Neural network based single index evaluation for SQL injection attack detection in health care data
(Elsevier Ltd.PE, 2023-05-24)
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation. The scale of computer network is very ...
Coordination strategies for securing AC/DC flexible transmission networks with renewables
(Institute of Electrical and Electronics Engineers Inc., 2018)
This paper studies key aspects of preventive and corrective security strategies to coordinate flexible transmission network infrastructure. To do so, we propose a two-stage stochastic
optimization model that can efficiently ...
SecLEACH - On the security of clustered sensor networks
(Elsevier Science BvAmsterdamHolanda, 2007)
Transmission network expansion planning in full open market considering security constraints
(2005-12-01)
This paper presents a mathematical model and a methodology to solve the transmission network expansion planning problem with security constraints in full competitive market, assuming that all generation programming plans ...
Transmission network expansion planning in full open market considering security constraints
(2005-12-01)
This paper presents a mathematical model and a methodology to solve the transmission network expansion planning problem with security constraints in full competitive market, assuming that all generation programming plans ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...
Market-driven security-constrained transmission network expansion planning
(2011-05-31)
This paper presents a Bi-level Programming (BP) approach to solve the Transmission Network Expansion Planning (TNEP) problem. The proposed model is envisaged under a market environment and considers security constraints. ...
Information Visualization Applied to Computer Network Security: A Case Study of a Wireless Network of a University
(2020-01-01)
Computer networks are becoming increasingly vital to the activities of organizations, and their monitoring is necessary to ensure proper functioning. The use of the human cognitive process in decision-making through ...