Abnormal detection methods of information security for power big data

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Under the big data environment, hi-tech technologies bring great convenience and advantages to the operation of the power system, making the power supply company more convenient and efficient in the process of information processing and using. This paper mainly introduces the application characteristics of power big data, the challenges faced by the information security protection system, and the solutions provided for responding to the information security of big data. The feasibility of information security analysis technology for power big data is discussed by using data mining correlation analysis, sequence analysis methods, anomaly detection and hypothesis testing methods. Security protection technologies and management methods are elaborated in detail to provide guarantees for safe, reliable, economical and efficient operation of power grids.

Cite

CITATION STYLE

APA

Hao-Yuan, P., Fei, L., Yi-Ying, Z., Wang, C., Ye-Shen, H., Xiang-Zhen, L., & Zhu, L. (2019). Abnormal detection methods of information security for power big data. In Advances in Intelligent Systems and Computing (Vol. 885, pp. 768–774). Springer Verlag. https://doi.org/10.1007/978-3-030-02804-6_100

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free