Power information network intrusion detection based on data mining algorithm
Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power i...
Saved in:
Published in | The Journal of supercomputing Vol. 76; no. 7; pp. 5521 - 5539 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.07.2020
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power information network intrusion detection framework for the intrusion attack problem of power information network and elaborates the implementation of each module. The association rule analysis algorithm and the association relationship between network data stream features can effectively detect the intrusion behaviour in the power information network. Experiments show that the intrusion detection system can effectively detect the intrusion attacks in the power information network and effectively protect the power information. |
---|---|
AbstractList | Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power information network intrusion detection framework for the intrusion attack problem of power information network and elaborates the implementation of each module. The association rule analysis algorithm and the association relationship between network data stream features can effectively detect the intrusion behaviour in the power information network. Experiments show that the intrusion detection system can effectively detect the intrusion attacks in the power information network and effectively protect the power information. |
Author | Dong, Limian Chang, Jie Zuo, Xiaojun Hou, Botao Chen, Ze |
Author_xml | – sequence: 1 givenname: Xiaojun surname: Zuo fullname: Zuo, Xiaojun email: js8834@163.com organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd – sequence: 2 givenname: Ze surname: Chen fullname: Chen, Ze organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd – sequence: 3 givenname: Limian surname: Dong fullname: Dong, Limian organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd – sequence: 4 givenname: Jie surname: Chang fullname: Chang, Jie organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd – sequence: 5 givenname: Botao surname: Hou fullname: Hou, Botao organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd |
BookMark | eNp9kEtLAzEUhYNUsK3-AVcDrqM3LzNZSvEFBV3oOqQzSZ3aSWqSofjvTTuCO1cXzj3nXO43QxMfvEXoksA1AZA3iRBKJQaiMNBaKUxP0JQIyTDwmk_QFBQFXAtOz9AspQ0AcCbZFC1fw97GqvMuxN7kLvjK27wP8bNoOQ7poLQ22-a4W5lk2-ogmWyqvvOdX1dmuw6xyx_9OTp1Zpvsxe-co_eH-7fFE16-PD4v7pa4YURlbFshlJOMgwRnpZG1A-EEbflK1kI00tHyxKq1hDN7y6lsGyJNQ5xsnVFNzeboauzdxfA12JT1JgzRl5OaclC1FKxE54iOriaGlKJ1ehe73sRvTUAfqOmRmi7U9JGapiXExlAqZr-28a_6n9QPvJtySw |
CitedBy_id | crossref_primary_10_1016_j_adhoc_2024_103407 crossref_primary_10_1088_1742_6596_2083_4_042047 crossref_primary_10_1155_2021_9948800 crossref_primary_10_3390_s22239318 crossref_primary_10_3390_en13092407 crossref_primary_10_3233_WEB_210486 crossref_primary_10_1111_coin_12500 crossref_primary_10_1155_2021_8321636 crossref_primary_10_3390_info13080375 |
Cites_doi | 10.1016/j.measurement.2014.04.034 10.1007/11574798_8 10.1109/JSYST.2013.2294120 10.1016/j.eij.2013.10.003 10.1016/j.procs.2015.03.174 10.1016/j.ijleo.2015.10.078 10.1002/zamm.201700080 10.1016/j.cose.2011.05.008 10.1016/j.asej.2013.01.003 10.1007/s10255-018-0740-3 10.1016/j.neucom.2013.04.038 10.1093/comjnl/bxu036 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2019 Springer Science+Business Media, LLC, part of Springer Nature 2019. |
Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019. |
DBID | AAYXX CITATION |
DOI | 10.1007/s11227-019-02899-2 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1573-0484 |
EndPage | 5539 |
ExternalDocumentID | 10_1007_s11227_019_02899_2 |
GrantInformation_xml | – fundername: project of hebei power technology of state grid from 2018 to 2019: Research and application of real-time situation assessment and visualization technology for information security of power enterprises based on simulation environment grantid: kj2018-047 |
GroupedDBID | -4Z -59 -5G -BR -EM -Y2 -~C .4S .86 .DC .VR 06D 0R~ 0VY 123 199 1N0 1SB 2.D 203 28- 29L 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AABYN AAFGU AAHNG AAIAL AAJKR AANZL AAOBN AARHV AARTL AATNV AATVU AAUYE AAWCG AAWWR AAYFA AAYIU AAYOK AAYQN AAYTO ABBBX ABBXA ABDBF ABDZT ABECU ABFGW ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKAS ABKCH ABKTR ABMNI ABMQK ABNWP ABPTK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFS ACHSB ACHXU ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACTTH ACVWB ACWMK ADGRI ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMDM ADOXG ADQRH ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEEQQ AEFIE AEFTE AEGAL AEGNC AEJHL AEJRE AEKMD AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AEYWE AFEXP AFGCZ AFLOW AFNRJ AFQWF AFWTZ AFZKB AGAYW AGDGC AGGBP AGGDS AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AI. AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. B0M BA0 BBWZM BDATZ BGNMA CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 EAD EAP EAS EBD EBLON EBS EDO EIOEI EJD EMK EPL ESBYG ESX F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC G8K GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ H~9 I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P9O PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RNI ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TSG TSK TSV TUC TUS U2A UG4 UNUBA UOJIU UTJUX UZXMN VC2 VFIZW VH1 W23 W48 WH7 WK8 YLTOR Z45 Z5O Z7R Z7S Z7X Z7Y Z7Z Z81 Z83 Z86 Z88 Z8M Z8N Z8R Z8S Z8T Z8U Z8W Z92 ZMTXR ~8M ~EX AACDK AAEOY AAJBT AASML AAYXX ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CITATION H13 AAYZH |
ID | FETCH-LOGICAL-c319t-ed559f734070fe7a78f05f52d4b7855c7f2028bde143e6427dc17ac1f7dfa9c83 |
IEDL.DBID | AGYKE |
ISSN | 0920-8542 |
IngestDate | Mon Nov 04 11:22:19 EST 2024 Thu Sep 12 17:04:13 EDT 2024 Sat Dec 16 12:01:35 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Keywords | Power information Network intrusion detection Data mining algorithm |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-ed559f734070fe7a78f05f52d4b7855c7f2028bde143e6427dc17ac1f7dfa9c83 |
PQID | 2409875314 |
PQPubID | 2043774 |
PageCount | 19 |
ParticipantIDs | proquest_journals_2409875314 crossref_primary_10_1007_s11227_019_02899_2 springer_journals_10_1007_s11227_019_02899_2 |
PublicationCentury | 2000 |
PublicationDate | 2020-07-01 |
PublicationDateYYYYMMDD | 2020-07-01 |
PublicationDate_xml | – month: 07 year: 2020 text: 2020-07-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationSubtitle | An International Journal of High-Performance Computer Design, Analysis, and Use |
PublicationTitle | The Journal of supercomputing |
PublicationTitleAbbrev | J Supercomput |
PublicationYear | 2020 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Yufei, Ting, Shaoyu, Baohua, Yujie (CR3) 2013; 37 Faisal, Aung, Williams, Sanchez (CR13) 2015; 9 Han, Xun, Jiang (CR11) 2015; 58 Chen, Liu (CR6) 2016; 2016 Shengqi, Chen, Liu (CR9) 2018; 98 Shamshirband, Amini, Anuar, Mat Kiah, Teh, Furnell (CR4) 2014; 55 Elbasiony, Sallam, Eltobely (CR12) 2013; 4 Louvieris, Clewley, Liu (CR15) 2013; 121 Davis, Clark (CR1) 2011; 30 Chen, Shengqi, Liu (CR7) 2018; 34 Li, Yang, Ding (CR2) 2016; 127 Ravale, Marathe, Padiya (CR10) 2015; 45 Kister, Ge, Herbert, Sinnecker, Wuerfel, Paul (CR8) 2013; 5 Rawat, Gulati, Pujari (CR14) 2005; 3700 Nadiammai, Hemalatha (CR5) 2014; 15 I Kister (2899_CR8) 2013; 5 Y Li (2899_CR2) 2016; 127 W Yufei (2899_CR3) 2013; 37 S Shamshirband (2899_CR4) 2014; 55 RM Elbasiony (2899_CR12) 2013; 4 MA Faisal (2899_CR13) 2015; 9 GV Nadiammai (2899_CR5) 2014; 15 JJ Davis (2899_CR1) 2011; 30 Lu Shengqi (2899_CR9) 2018; 98 U Ravale (2899_CR10) 2015; 45 M Chen (2899_CR6) 2016; 2016 Miaochao Chen (2899_CR7) 2018; 34 G Han (2899_CR11) 2015; 58 P Louvieris (2899_CR15) 2013; 121 S Rawat (2899_CR14) 2005; 3700 |
References_xml | – volume: 55 start-page: 212 year: 2014 end-page: 226 ident: CR4 article-title: D-ficca: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks publication-title: Measurement doi: 10.1016/j.measurement.2014.04.034 contributor: fullname: Furnell – volume: 3700 start-page: 144 issue: 4 year: 2005 end-page: 161 ident: CR14 article-title: A fast host-based intrusion detection system using rough set theory publication-title: Lect Notes Comput Sci doi: 10.1007/11574798_8 contributor: fullname: Pujari – volume: 9 start-page: 31 issue: 1 year: 2015 end-page: 44 ident: CR13 article-title: Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study publication-title: IEEE Syst J doi: 10.1109/JSYST.2013.2294120 contributor: fullname: Sanchez – volume: 15 start-page: 37 issue: 1 year: 2014 end-page: 50 ident: CR5 article-title: Effective approach toward intrusion detection system using data mining techniques publication-title: Egypt Inform J doi: 10.1016/j.eij.2013.10.003 contributor: fullname: Hemalatha – volume: 37 start-page: 2675 issue: 9 year: 2013 end-page: 2680 ident: CR3 article-title: An intrusion detection method for electric power information network based on improved minimum enclosing ball vector machine publication-title: Power Syst Technol contributor: fullname: Yujie – volume: 45 start-page: 428 issue: 39 year: 2015 end-page: 435 ident: CR10 article-title: Feature selection based hybrid anomaly intrusion detection system using k means and rbf kernel function publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2015.03.174 contributor: fullname: Padiya – volume: 5 start-page: 689 issue: 4 year: 2013 end-page: 696 ident: CR8 article-title: Improved semi-supervised fuzzy clustering algorithm and application in effective intrusion detection system publication-title: Int J Adv Comput Technol contributor: fullname: Paul – volume: 127 start-page: 345 issue: 1 year: 2016 end-page: 351 ident: CR2 article-title: A minimum enclosing ball-based support vector machine approach for detection of phishing websites publication-title: Optik Int J Light Electron Opt doi: 10.1016/j.ijleo.2015.10.078 contributor: fullname: Ding – volume: 98 start-page: 1574 issue: 9 year: 2018 end-page: 1584 ident: CR9 article-title: On regularity for an Ericksen-Leslie’s parabolic-hyperbolic liquid crystals model publication-title: Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik doi: 10.1002/zamm.201700080 contributor: fullname: Liu – volume: 30 start-page: 353 issue: 6–7 year: 2011 end-page: 375 ident: CR1 article-title: Data preprocessing for anomaly based network intrusion detection: a review publication-title: Comput Secur doi: 10.1016/j.cose.2011.05.008 contributor: fullname: Clark – volume: 4 start-page: 753 issue: 4 year: 2013 end-page: 762 ident: CR12 article-title: A hybrid network intrusion detection framework based on random forests and weighted k-means publication-title: Ain Shams Eng J doi: 10.1016/j.asej.2013.01.003 contributor: fullname: Eltobely – volume: 34 start-page: 398 issue: 2 year: 2018 end-page: 403 ident: CR7 article-title: Global regularity for a 2D model of electro-kinetic fluid in a bounded domain publication-title: Acta Math Appl Sin Engl Ser doi: 10.1007/s10255-018-0740-3 contributor: fullname: Liu – volume: 2016 start-page: 1 issue: 128 year: 2016 end-page: 8 ident: CR6 article-title: Blow-up criteria of smooth solutions to a 3D model of electro-kinetic fluids in a bounded domain publication-title: Electron J Diff Equ contributor: fullname: Liu – volume: 121 start-page: 265 issue: 18 year: 2013 end-page: 273 ident: CR15 article-title: Effects-based feature identification for network intrusion detection publication-title: Neurocomputing doi: 10.1016/j.neucom.2013.04.038 contributor: fullname: Liu – volume: 58 start-page: 1280 issue: 6 year: 2015 end-page: 1292 ident: CR11 article-title: Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks publication-title: Comput J doi: 10.1093/comjnl/bxu036 contributor: fullname: Jiang – volume: 121 start-page: 265 issue: 18 year: 2013 ident: 2899_CR15 publication-title: Neurocomputing doi: 10.1016/j.neucom.2013.04.038 contributor: fullname: P Louvieris – volume: 3700 start-page: 144 issue: 4 year: 2005 ident: 2899_CR14 publication-title: Lect Notes Comput Sci doi: 10.1007/11574798_8 contributor: fullname: S Rawat – volume: 127 start-page: 345 issue: 1 year: 2016 ident: 2899_CR2 publication-title: Optik Int J Light Electron Opt doi: 10.1016/j.ijleo.2015.10.078 contributor: fullname: Y Li – volume: 37 start-page: 2675 issue: 9 year: 2013 ident: 2899_CR3 publication-title: Power Syst Technol contributor: fullname: W Yufei – volume: 30 start-page: 353 issue: 6–7 year: 2011 ident: 2899_CR1 publication-title: Comput Secur doi: 10.1016/j.cose.2011.05.008 contributor: fullname: JJ Davis – volume: 5 start-page: 689 issue: 4 year: 2013 ident: 2899_CR8 publication-title: Int J Adv Comput Technol contributor: fullname: I Kister – volume: 2016 start-page: 1 issue: 128 year: 2016 ident: 2899_CR6 publication-title: Electron J Diff Equ contributor: fullname: M Chen – volume: 34 start-page: 398 issue: 2 year: 2018 ident: 2899_CR7 publication-title: Acta Math Appl Sin Engl Ser doi: 10.1007/s10255-018-0740-3 contributor: fullname: Miaochao Chen – volume: 15 start-page: 37 issue: 1 year: 2014 ident: 2899_CR5 publication-title: Egypt Inform J doi: 10.1016/j.eij.2013.10.003 contributor: fullname: GV Nadiammai – volume: 45 start-page: 428 issue: 39 year: 2015 ident: 2899_CR10 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2015.03.174 contributor: fullname: U Ravale – volume: 55 start-page: 212 year: 2014 ident: 2899_CR4 publication-title: Measurement doi: 10.1016/j.measurement.2014.04.034 contributor: fullname: S Shamshirband – volume: 98 start-page: 1574 issue: 9 year: 2018 ident: 2899_CR9 publication-title: Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik doi: 10.1002/zamm.201700080 contributor: fullname: Lu Shengqi – volume: 9 start-page: 31 issue: 1 year: 2015 ident: 2899_CR13 publication-title: IEEE Syst J doi: 10.1109/JSYST.2013.2294120 contributor: fullname: MA Faisal – volume: 58 start-page: 1280 issue: 6 year: 2015 ident: 2899_CR11 publication-title: Comput J doi: 10.1093/comjnl/bxu036 contributor: fullname: G Han – volume: 4 start-page: 753 issue: 4 year: 2013 ident: 2899_CR12 publication-title: Ain Shams Eng J doi: 10.1016/j.asej.2013.01.003 contributor: fullname: RM Elbasiony |
SSID | ssj0004373 |
Score | 2.3396177 |
Snippet | Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 5521 |
SubjectTerms | Algorithms Compilers Computer Science Data mining Data transmission Interpreters Intrusion detection systems Processor Architectures Programming Languages |
Title | Power information network intrusion detection based on data mining algorithm |
URI | https://link.springer.com/article/10.1007/s11227-019-02899-2 https://www.proquest.com/docview/2409875314 |
Volume | 76 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagXVgoT1EolQc2cNU4cZyMLWqpeFQMrVSmyE9A0BRBWPj1nPNQxGtgvURWcvb57tPdd4fQiVY2VtaGJPQpABTfWiJDzok0hmlJQ64Cx3e-mYaTeXC5YIuax50Xu1cZyfyirrluHqWuSjImLjkWE7h3myXxtDm4uLsa1XRIv0gsx4CMIhbQkivz-ypf_VEdZH7Li-buZtxCs4q0U1SZPPXeM9lTHz97OP7nT7bQZhl-4kFxXrbRmkl3UKsa7YBLS99F17duehou26q6zcNpUTAOMsfTcBJtsryQK8XOF2rsRCITeJkPncDi-X71-pg9LPfQfDyanU9IOXiBKLDIjBgNOMNyH8Be3xoueGT7zDKqA8kjxhS3FL5cagPBlgEAw7XyuFCe5dqKWEX-Pmqkq9QcIAz3BwMbjyWVLJDMExDRBdpYT_uRsCZso9NK_clL0V8jqTspO0UloKgkV1RC26hT7VBS2tpbAjFJ7FCXF7TRWaXx-vHfqx3-7_UjtEEd2M5rdTuoAco2xxCRZLILJ3A8HE675UnsovU5HXwCDjLZhg |
link.rule.ids | 315,783,787,27936,27937,41093,41535,42162,42604,52123,52246 |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEB1ED3rxW6xW3YM3XWg22WxyLGKp2hYPLfS27KcKNhWb_4-zaUJQ9OB1ExbysrMzj5k3A3Btjc-N9ylNY4YEJfae6lQIqp3jVrNUmCTonceTdDhLHud8XovCVk21e5OSrG7qVuwWMRbKJHMasmM5xYt3K_RXDx3zZ6zfqiHjdV45R2KU8YTVUpnf9_jujtoY80datPI2g33YrcNE0l__1wPYcMUh7DUjGEhtkUcweg5Tzkjd_jSATIp1YTeuBT1FWLGurAquChJ8liVhSZWKLKrhEES9vyw_38rXxTHMBvfTuyGtByRQg5ZTUmeRD3gRIynreSeUyHyPe85sokXGuRGe4Wdq6zAockg0hDWRUCbywnqVmyw-gc1iWbhTIGjnHG0x10zzRPNIYeSVWOcjG2fKu7QDNw1O8mPdB0O2HY8DqhJRlRWqknWg20Apa5tYSYwd8sCOoqQDtw287eO_dzv73-tXsD2cjkdy9DB5OocdFghyVV_bhU0E3l1gFFHqy-rQfAHw0b34 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDLbQJiEujKcYDMiBGxRo2jTtcYKNx2DiABKcqjwBwQqCcuHX4_ShAoID4ppUUeoktj_Znw2wpZVNlLWRFwUUAUpgrScjzj1pDNOSRlyFju98Po6Or8LTa3b9icVfZLvXIcmS0-CqNGX53rO2ew3xzafUpUwmnouUJR4q4XboKiO1oN0_uhkNGm5kUEaZE4RJMQtpRZz5eZWvxqnxOL8FSQvbM-yAqHddppw87L7lcle9fyvo-J_fmoPZyjEl_fImzcOUyRagUzd9IJUOWISzC9dXjVQFV92xkqxMJccxx-BwI9rkRYpXRpyV1MQNiVyQSdGOgojH26eX-_xusgRXw8HlwbFXtWTwFL7V3DMaEYjlAcLAfWu44LHdZ5ZRHUoeM6a4pbhzqQ26YQahDdfK50L5lmsrEhUHy9DKnjKzAgQ1C8PXn0gqWSiZL9DXC7Wxvg5iYU3Uhe36LNLnsvJG2tRYdoJKUVBpIaiUdqFXH1davcLXFL2VxOExP-zCTi39Zvr31Vb_9vkmTF8cDtOzk_FoDWaoQ-RFQm8PWih3s45uSy43qpv5AaYW49k |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Power+information+network+intrusion+detection+based+on+data+mining+algorithm&rft.jtitle=The+Journal+of+supercomputing&rft.au=Zuo%2C+Xiaojun&rft.au=Chen%2C+Ze&rft.au=Dong%2C+Limian&rft.au=Chang%2C+Jie&rft.date=2020-07-01&rft.pub=Springer+US&rft.issn=0920-8542&rft.eissn=1573-0484&rft.volume=76&rft.issue=7&rft.spage=5521&rft.epage=5539&rft_id=info:doi/10.1007%2Fs11227-019-02899-2&rft.externalDocID=10_1007_s11227_019_02899_2 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0920-8542&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0920-8542&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0920-8542&client=summon |