[1] |
曾鸣, 王雨晴, 李明珠 ,等. 泛在电力物联网体系架构及实施方案初探[J]. 智慧电力, 2019,47(4): 1-7,58.
|
|
ZENG M , WANG Y Q , LI M Z ,et al. Preliminary study on the architecture and implementation plan of widespread power internet of things[J]. Smart Power, 2019,47(4): 1-7,58.
|
[2] |
赵佩 . 勒索病毒攻击事件漏洞分析及应对防护策略[J]. 电子技术与软件工程, 2019(4):201.
|
|
ZHAO P . Vulnerability analysis and response protection strategy of Ransom ware attack event[J]. Network Security Technology & Application, 2019(4):201.
|
[3] |
吴信东, 董丙冰, 堵新政 ,等. 数据治理技术[J]. 软件学报, 2019,30(9): 25-27.
|
|
WU X D , DONG B B , DU X Z ,et al. Data governance technology[J]. Journal of Software, 2019,30(9): 25-27.
|
[4] |
史琳, 吴疆, 吴霞虹 . 电力企业级数据治理体系的研究[J]. 电子世界, 2018(22): 184-185.
|
|
SHI L , WU J , WU X H . Research on power enterprise data management system[J]. Electronics World, 2018(22): 184-185.
|
[5] |
韩昌选, 乐璐 . 大数据时代下信息数据安全的探讨[J]. 电子技术与软件工程, 2013(24): 227-228.
|
|
HAN C X , LE L . Discussion on the security of information data in the age of big data[J]. Electronic Technology & Software Engineering, 2013(24): 227-228.
|
[6] |
周景 . 大数据时代信息安全的防范对策思考与探讨[J]. 信息与电脑, 2019(2): 218-220.
|
|
ZHOU J . Thinking and discussion on the countermeasures of information security in the age of big data[J]. Computer Programming Skills & Maintenance, 2019(2): 218-220.
|
[7] |
秦体德 . 浅析计算机网络安全管理技术的开发及应用[J]. 湖北科技学院学报, 2013(10): 19-20.
|
|
QIN T D . Analysis on the development and application of computer network security management technology[J]. Journal of Hubei University of Science and Technology, 2013(10): 19-20.
|
[8] |
沈玲 . 美国如何保护关键信息基础设施[J]. 人民邮电,2016-11-30(6).
|
|
SHEN L . How the United States protects critical information infrastructure[J]. People's post and telecommunications,2016-11-30(6).
|
[9] |
张新刚, 于波, 程新党 ,等. 大数据与云计算环境下个人信息安全协同保护研究[J]. 电脑知识与技术, 2016(3): 53-55.
|
|
ZHANG X G , YU B , CHENG X D ,et al. Research on collaborative protection of personal information security in big data and cloud computing environment[J]. Computer Knowledge and Technology, 2016(3): 53-55.
|
[10] |
童云海, 陶有东, 唐世渭 ,等. 隐私保护数据发布中身份保持的匿名方法[J]. 软件学报, 2010(4): 771-781.
|
|
TONG Y H , TAO Y D , TANG S W ,et al. Identity-reserved anonymity in privacy preserving data publishing[J]. Journal of Software, 2010(4): 771-781.
|
[11] |
张亮 . 基于云计算环境的大数据安全存储机制研究[D]. 南京:东南大学, 2016.
|
|
ZHANG L . Research on secure storage mechanisms for big data based on cloud computing[D]. Nanjing:Southeast University, 2016.
|
[12] |
李如初, 沈名龙, 彭海棠 . 大数据、云计算在电力工业中的应用[J]. 电信科学, 2018,34(4): 151-155.
|
|
LI R C , SHEN M L , PENG H T . Application of big data and cloud computing in power industry[J]. Telecommunications Science, 2018,34(4): 151-155.
|