Uneingeschränkter Zugang

Application and Optimization of Endogenous Security Mechanisms in Photovoltaic Data Transmission and Storage

, , ,  und   
17. März 2025

Zitieren
COVER HERUNTERLADEN

Wu, J. (2022). Cyberspace endogenous safety and security. Engineering, 15, 179-185. Wu J. ( 2022 ). Cyberspace endogenous safety and security . Engineering , 15 , 179 - 185 . Search in Google Scholar

Liu, X., Wang, H., & Li, C. (2024). A Review of Endogenous Security Research. Electronics, 13(11), 2185. Liu X. Wang H. Li C. ( 2024 ). A Review of Endogenous Security Research . Electronics , 13 ( 11 ), 2185 . Search in Google Scholar

Jin, L., Hu, X., Lou, Y., Zhong, Z., Sun, X., Wang, H., & Wu, J. (2021). Introduction to wireless endogenous security and safety: Problems, attributes, structures and functions. China Communications, 18(9), 88-99. Jin L. Hu X. Lou Y. Zhong Z. Sun X. Wang H. Wu J. ( 2021 ). Introduction to wireless endogenous security and safety: Problems, attributes, structures and functions . China Communications , 18 ( 9 ), 88 - 99 . Search in Google Scholar

Zhiwen, J., Tao, L., & Aiqun, H. (2020, December). Research on endogenous security methods of embedded system. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 1946-1950). IEEE. Zhiwen J. Tao L. Aiqun H. ( 2020 , December ). Research on endogenous security methods of embedded system . In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 1946 - 1950 ). IEEE . Search in Google Scholar

Wu, J. (2024). The Principle and Structure of Cyberspace Endogenous Security and Safety. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 111-202). Singapore: Springer Nature Singapore. Wu J. ( 2024 ). The Principle and Structure of Cyberspace Endogenous Security and Safety . In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 111 - 202 ). Singapore : Springer Nature Singapore . Search in Google Scholar

Norman, T. L. (2011). Integrated security systems design: concepts, specifications, and implementation. Elsevier. Norman T. L. ( 2011 ). Integrated security systems design: concepts, specifications, and implementation . Elsevier . Search in Google Scholar

Sahu, D. R., & Tomar, D. S. (2017). Analysis of web application code vulnerabilities using secure coding standards. Arabian Journal for Science and Engineering, 42, 885-895. Sahu D. R. Tomar D. S. ( 2017 ). Analysis of web application code vulnerabilities using secure coding standards . Arabian Journal for Science and Engineering , 42 , 885 - 895 . Search in Google Scholar

Gasiba, T. E., Lechner, U., Pinto-Albuquerque, M., & Fernandez, D. M. (2020, December). Awareness of Secure Coding Guidelines in the Industry-A first data analysis. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 345-352). IEEE. Gasiba T. E. Lechner U. Pinto-Albuquerque M. Fernandez D. M. ( 2020 , December ). Awareness of Secure Coding Guidelines in the Industry-A first data analysis . In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 345 - 352 ). IEEE . Search in Google Scholar

Vincoli, J. W. (2024). Basic guide to system safety. John Wiley & Sons. Vincoli J. W. ( 2024 ). Basic guide to system safety . John Wiley & Sons . Search in Google Scholar

Wu, J. (2024). Cyberspace Endogenous Security and Safety Problems. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 1-73). Singapore: Springer Nature Singapore. Wu J. ( 2024 ). Cyberspace Endogenous Security and Safety Problems . In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 1 - 73 ). Singapore : Springer Nature Singapore . Search in Google Scholar

Yu, F., Wei, Q., Geng, Y., & Wang, Y. (2021, June). Research on key technology of industrial network boundary protection based on endogenous security. In 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (Vol. 4, pp. 112-121). IEEE. Yu F. Wei Q. Geng Y. Wang Y. ( 2021 , June ). Research on key technology of industrial network boundary protection based on endogenous security . In 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (Vol. 4 , pp. 112 - 121 ). IEEE . Search in Google Scholar

Wu, J. (2024). Cyberspace Endogenous Security and Safety Defense Vision. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 75-109). Singapore: Springer Nature Singapore. Wu J. ( 2024 ). Cyberspace Endogenous Security and Safety Defense Vision . In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 75 - 109 ). Singapore : Springer Nature Singapore . Search in Google Scholar

Meng, H., Ou, Q., Jing, Y., Song, J., Qiao, C., & Zhang, J. (2022). Research on the Endogenous Security Technology of Polymorphic Smart Network. In Proceedings of the 11th International Conference on Computer Engineering and Networks (pp. 813-822). Springer Singapore. Meng H. Ou Q. Jing Y. Song J. Qiao C. Zhang J. ( 2022 ). Research on the Endogenous Security Technology of Polymorphic Smart Network . In Proceedings of the 11th International Conference on Computer Engineering and Networks (pp. 813 - 822 ). Springer Singapore . Search in Google Scholar

Guo, W., Hang, F., Xie, L., Lv, Y., & Chen, H. (2021, November). Endogenous Security Protection Method Suitable for the Full Life Cycle of Docker. In ISCTT 2021; 6th International Conference on Information Science, Computer Technology and Transportation (pp. 1-4). VDE. Guo W. Hang F. Xie L. Lv Y. Chen H. ( 2021 , November ). Endogenous Security Protection Method Suitable for the Full Life Cycle of Docker . In ISCTT 2021; 6th International Conference on Information Science, Computer Technology and Transportation (pp. 1 - 4 ). VDE . Search in Google Scholar

Ji, X., Wu, J., Jin, L., Huang, K., Chen, Y., Sun, X., … & Yang, J. (2022). Discussion on a new paradigm of endogenous security towards 6G networks. Frontiers of Information Technology & Electronic Engineering, 23(10), 1421-1450. Ji X. Wu J. Jin L. Huang K. Chen Y. Sun X. Yang J. ( 2022 ). Discussion on a new paradigm of endogenous security towards 6G networks . Frontiers of Information Technology & Electronic Engineering , 23 ( 10 ), 1421 - 1450 . Search in Google Scholar

Hu, H., Ling, Z., Wang, Y., Li, Q., Jin, L., & Wu, J. (2021). Advanced computing and endogenous security. China Communications, 18(8), iii-v. Hu H. Ling Z. Wang Y. Li Q. Jin L. Wu J. ( 2021 ). Advanced computing and endogenous security . China Communications , 18 ( 8 ), iii - v . Search in Google Scholar

Cai, N., & He, G. (2024). Multi-cloud resource scheduling intelligent system with endogenous security. Electronic Research Archive, 32(2), 1380-1405. Cai N. He G. ( 2024 ). Multi-cloud resource scheduling intelligent system with endogenous security . Electronic Research Archive , 32 ( 2 ), 1380 - 1405 . Search in Google Scholar

Yao Zhong Min, Liu Xi Guang & Wang Ya Zhen. (2011). Design of Building PV Power Station Data Transmission and Monitoring System Based on ZigBee. Applied Mechanics and Materials(121-126), 1259-1263. Min Yao Zhong Guang Liu Xi Zhen Wang Ya ( 2011 ). Design of Building PV Power Station Data Transmission and Monitoring System Based on ZigBee . Applied Mechanics and Materials ( 121-126 ), 1259 - 1263 . Search in Google Scholar

Ruchi Agrawal, Saurabh Singhal & Ashish Sharma. (2024). Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Computing(6),8015-8030. Agrawal Ruchi Singhal Saurabh Sharma Ashish ( 2024 ). Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm . Cluster Computing ( 6 ), 8015 - 8030 . Search in Google Scholar

Yuanliang Fan, Zewen Li, Xinghua Huang, Dongtao Luo, Jianli Lin, Weiming Chen… & Ling Yang. (2024). An Energy Management System for Distributed Energy Storage System Considering Time-Varying Linear Resistance. Electronics(21),4327-4327. Fan Yuanliang Li Zewen Huang Xinghua Luo Dongtao Lin Jianli Chen Weiming Yang Ling ( 2024 ). An Energy Management System for Distributed Energy Storage System Considering Time-Varying Linear Resistance . Electronics ( 21 ), 4327 - 4327 . Search in Google Scholar

Zhao Xuesong, Fan Xiaofei & Hou Jing. (2022). Security architecture and technology of power Internet of things for energy interconnection. Journal of Physics: Conference Series(1). Xuesong Zhao Xiaofei Fan Jing Hou ( 2022 ). Security architecture and technology of power Internet of things for energy interconnection . Journal of Physics: Conference Series ( 1 ). Search in Google Scholar

Xu Lei & Zhou Haocheng. (2022). An Automated Data Desensitisation System Based on the Middle Platform. Security and Communication Networks. Lei Xu Haocheng Zhou ( 2022 ). An Automated Data Desensitisation System Based on the Middle Platform . Security and Communication Networks . Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Biologie, Biologie, andere, Mathematik, Angewandte Mathematik, Mathematik, Allgemeines, Physik, Physik, andere