期刊文献+

电力系统机房信息化网络拓扑管理解决方案

下载PDF
导出
摘要 随着信息化网络技术的不断发展,电力系统机房的重要性也在不断地显现出来。本篇文章将从目前电力系统机房内出现的电线多、乱、杂等一系列问题出发,根据具体的需要提出关于网络拓扑管理的相关解决方案,在协调各方的情况下将网络拓扑系统内的数据与现场的配线数据实现同步,提高电力系统机房的信息化程度,提高机房的信息化管理水平。
出处 《数字通信世界》 2020年第1期264-265,共2页 Digital Communication World
  • 相关文献

参考文献4

二级参考文献55

  • 1Shiravi H, Shiravi A, Ghorbani A A. A survey of visualization systems for network security [J]. IEEE Transactions on Visualization and Computer Graphics, 2012, 18(8) - 1313-1329.
  • 2Harrison L, Lu A. The future of security visualization: lessons from network visualization [J]. IEEE Network, 2012, 26(6): 6-11.
  • 3Becket R A, Eick S G, Wilks A R. Visualizing network data [J]. IEEE Transactions on Visualization and Computer Graphics, 1995, 1(1): 16-28.
  • 4Girardin L, Brodbeck D. A visual approach for monitoring logs [C] //Proceedings of Large Installation System Administration Conference. New York- ACM Press, 1998: 299-308.
  • 5VizSec Homepage [EB/OL]. [ 2014-01-09] http://www. vizsec, org. 2013.
  • 6VAST Challenge Homepage in vacommunity [EB/OL]. [ 2014-01-09] http://www, vacommunity, org/VAST + Challenge+ 2013. 2013.
  • 7Nataraj L, Karthikeyan S, Jacob G, et al. Malware images: visualization and automatic classification [C] //Proceedings of the 8th International Symposium on Visualization for Cyher Security. New York: ACM Press, 2011:4-11.
  • 8Mansmann F, G6bel T, Cheswick W. Visual analysis of complex firewall configurations [C] //Proceedings of the 9th International Symposium on Visualization for Cyber Security. New York.. ACM Press, 2012:1-8.
  • 9Koike H, Ohno K, Koizumi K. Visualizing cyber-attacks using IP matrix [C] //Proceedings of Visualization for Computer Security. Los Alamitos- IEEE Computer Society Press, 2005:91-98.
  • 10Atkison T, Pensy K, Nicholas C, et al. Case study: visualization and information retrieval techniques for network intrusion detection [M] //Data Visualization. Hedelberg: Springer, 2001:283-290.

共引文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部