Power information network intrusion detection based on data mining algorithm

Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power i...

Full description

Saved in:
Bibliographic Details
Published inThe Journal of supercomputing Vol. 76; no. 7; pp. 5521 - 5539
Main Authors Zuo, Xiaojun, Chen, Ze, Dong, Limian, Chang, Jie, Hou, Botao
Format Journal Article
LanguageEnglish
Published New York Springer US 01.07.2020
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power information network intrusion detection framework for the intrusion attack problem of power information network and elaborates the implementation of each module. The association rule analysis algorithm and the association relationship between network data stream features can effectively detect the intrusion behaviour in the power information network. Experiments show that the intrusion detection system can effectively detect the intrusion attacks in the power information network and effectively protect the power information.
AbstractList Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and its development history. Based on the analysis of power information network structure and its security partition, this paper proposes a power information network intrusion detection framework for the intrusion attack problem of power information network and elaborates the implementation of each module. The association rule analysis algorithm and the association relationship between network data stream features can effectively detect the intrusion behaviour in the power information network. Experiments show that the intrusion detection system can effectively detect the intrusion attacks in the power information network and effectively protect the power information.
Author Dong, Limian
Chang, Jie
Zuo, Xiaojun
Hou, Botao
Chen, Ze
Author_xml – sequence: 1
  givenname: Xiaojun
  surname: Zuo
  fullname: Zuo, Xiaojun
  email: js8834@163.com
  organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd
– sequence: 2
  givenname: Ze
  surname: Chen
  fullname: Chen, Ze
  organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd
– sequence: 3
  givenname: Limian
  surname: Dong
  fullname: Dong, Limian
  organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd
– sequence: 4
  givenname: Jie
  surname: Chang
  fullname: Chang, Jie
  organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd
– sequence: 5
  givenname: Botao
  surname: Hou
  fullname: Hou, Botao
  organization: Electric Power Research Institute of State Grid Hebei Electric Power Supply Co., Ltd
BookMark eNp9kEtLAzEUhYNUsK3-AVcDrqM3LzNZSvEFBV3oOqQzSZ3aSWqSofjvTTuCO1cXzj3nXO43QxMfvEXoksA1AZA3iRBKJQaiMNBaKUxP0JQIyTDwmk_QFBQFXAtOz9AspQ0AcCbZFC1fw97GqvMuxN7kLvjK27wP8bNoOQ7poLQ22-a4W5lk2-ogmWyqvvOdX1dmuw6xyx_9OTp1Zpvsxe-co_eH-7fFE16-PD4v7pa4YURlbFshlJOMgwRnpZG1A-EEbflK1kI00tHyxKq1hDN7y6lsGyJNQ5xsnVFNzeboauzdxfA12JT1JgzRl5OaclC1FKxE54iOriaGlKJ1ehe73sRvTUAfqOmRmi7U9JGapiXExlAqZr-28a_6n9QPvJtySw
CitedBy_id crossref_primary_10_1016_j_adhoc_2024_103407
crossref_primary_10_1088_1742_6596_2083_4_042047
crossref_primary_10_1155_2021_9948800
crossref_primary_10_3390_s22239318
crossref_primary_10_3390_en13092407
crossref_primary_10_3233_WEB_210486
crossref_primary_10_1111_coin_12500
crossref_primary_10_1155_2021_8321636
crossref_primary_10_3390_info13080375
Cites_doi 10.1016/j.measurement.2014.04.034
10.1007/11574798_8
10.1109/JSYST.2013.2294120
10.1016/j.eij.2013.10.003
10.1016/j.procs.2015.03.174
10.1016/j.ijleo.2015.10.078
10.1002/zamm.201700080
10.1016/j.cose.2011.05.008
10.1016/j.asej.2013.01.003
10.1007/s10255-018-0740-3
10.1016/j.neucom.2013.04.038
10.1093/comjnl/bxu036
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2019
Springer Science+Business Media, LLC, part of Springer Nature 2019.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2019.
DBID AAYXX
CITATION
DOI 10.1007/s11227-019-02899-2
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-0484
EndPage 5539
ExternalDocumentID 10_1007_s11227_019_02899_2
GrantInformation_xml – fundername: project of hebei power technology of state grid from 2018 to 2019: Research and application of real-time situation assessment and visualization technology for information security of power enterprises based on simulation environment
  grantid: kj2018-047
GroupedDBID -4Z
-59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
06D
0R~
0VY
123
199
1N0
1SB
2.D
203
28-
29L
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5QI
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AABYN
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AAOBN
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAWWR
AAYFA
AAYIU
AAYOK
AAYQN
AAYTO
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABFGW
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKAS
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABPTK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFS
ACHSB
ACHXU
ACIGE
ACIPQ
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACTTH
ACVWB
ACWMK
ADGRI
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMDM
ADOXG
ADQRH
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEEQQ
AEFIE
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AENEX
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEVLU
AEVTX
AEXYK
AEYWE
AFEXP
AFGCZ
AFLOW
AFNRJ
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGBP
AGGDS
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AI.
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
B0M
BA0
BBWZM
BDATZ
BGNMA
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EAD
EAP
EAS
EBD
EBLON
EBS
EDO
EIOEI
EJD
EMK
EPL
ESBYG
ESX
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
G8K
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
H~9
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
N9A
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
OVD
P19
P2P
P9O
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TEORI
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UNUBA
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VH1
W23
W48
WH7
WK8
YLTOR
Z45
Z5O
Z7R
Z7S
Z7X
Z7Y
Z7Z
Z81
Z83
Z86
Z88
Z8M
Z8N
Z8R
Z8S
Z8T
Z8U
Z8W
Z92
ZMTXR
~8M
~EX
AACDK
AAEOY
AAJBT
AASML
AAYXX
ABAKF
ACAOD
ACDTI
ACZOJ
AEFQL
AEMSY
AFBBN
AGQEE
AGRTI
AIGIU
CITATION
H13
AAYZH
ID FETCH-LOGICAL-c319t-ed559f734070fe7a78f05f52d4b7855c7f2028bde143e6427dc17ac1f7dfa9c83
IEDL.DBID AGYKE
ISSN 0920-8542
IngestDate Mon Nov 04 11:22:19 EST 2024
Thu Sep 12 17:04:13 EDT 2024
Sat Dec 16 12:01:35 EST 2023
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords Power information
Network intrusion detection
Data mining algorithm
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-ed559f734070fe7a78f05f52d4b7855c7f2028bde143e6427dc17ac1f7dfa9c83
PQID 2409875314
PQPubID 2043774
PageCount 19
ParticipantIDs proquest_journals_2409875314
crossref_primary_10_1007_s11227_019_02899_2
springer_journals_10_1007_s11227_019_02899_2
PublicationCentury 2000
PublicationDate 2020-07-01
PublicationDateYYYYMMDD 2020-07-01
PublicationDate_xml – month: 07
  year: 2020
  text: 2020-07-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle An International Journal of High-Performance Computer Design, Analysis, and Use
PublicationTitle The Journal of supercomputing
PublicationTitleAbbrev J Supercomput
PublicationYear 2020
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Yufei, Ting, Shaoyu, Baohua, Yujie (CR3) 2013; 37
Faisal, Aung, Williams, Sanchez (CR13) 2015; 9
Han, Xun, Jiang (CR11) 2015; 58
Chen, Liu (CR6) 2016; 2016
Shengqi, Chen, Liu (CR9) 2018; 98
Shamshirband, Amini, Anuar, Mat Kiah, Teh, Furnell (CR4) 2014; 55
Elbasiony, Sallam, Eltobely (CR12) 2013; 4
Louvieris, Clewley, Liu (CR15) 2013; 121
Davis, Clark (CR1) 2011; 30
Chen, Shengqi, Liu (CR7) 2018; 34
Li, Yang, Ding (CR2) 2016; 127
Ravale, Marathe, Padiya (CR10) 2015; 45
Kister, Ge, Herbert, Sinnecker, Wuerfel, Paul (CR8) 2013; 5
Rawat, Gulati, Pujari (CR14) 2005; 3700
Nadiammai, Hemalatha (CR5) 2014; 15
I Kister (2899_CR8) 2013; 5
Y Li (2899_CR2) 2016; 127
W Yufei (2899_CR3) 2013; 37
S Shamshirband (2899_CR4) 2014; 55
RM Elbasiony (2899_CR12) 2013; 4
MA Faisal (2899_CR13) 2015; 9
GV Nadiammai (2899_CR5) 2014; 15
JJ Davis (2899_CR1) 2011; 30
Lu Shengqi (2899_CR9) 2018; 98
U Ravale (2899_CR10) 2015; 45
M Chen (2899_CR6) 2016; 2016
Miaochao Chen (2899_CR7) 2018; 34
G Han (2899_CR11) 2015; 58
P Louvieris (2899_CR15) 2013; 121
S Rawat (2899_CR14) 2005; 3700
References_xml – volume: 55
  start-page: 212
  year: 2014
  end-page: 226
  ident: CR4
  article-title: D-ficca: a density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks
  publication-title: Measurement
  doi: 10.1016/j.measurement.2014.04.034
  contributor:
    fullname: Furnell
– volume: 3700
  start-page: 144
  issue: 4
  year: 2005
  end-page: 161
  ident: CR14
  article-title: A fast host-based intrusion detection system using rough set theory
  publication-title: Lect Notes Comput Sci
  doi: 10.1007/11574798_8
  contributor:
    fullname: Pujari
– volume: 9
  start-page: 31
  issue: 1
  year: 2015
  end-page: 44
  ident: CR13
  article-title: Data-stream-based intrusion detection system for advanced metering infrastructure in smart grid: a feasibility study
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2013.2294120
  contributor:
    fullname: Sanchez
– volume: 15
  start-page: 37
  issue: 1
  year: 2014
  end-page: 50
  ident: CR5
  article-title: Effective approach toward intrusion detection system using data mining techniques
  publication-title: Egypt Inform J
  doi: 10.1016/j.eij.2013.10.003
  contributor:
    fullname: Hemalatha
– volume: 37
  start-page: 2675
  issue: 9
  year: 2013
  end-page: 2680
  ident: CR3
  article-title: An intrusion detection method for electric power information network based on improved minimum enclosing ball vector machine
  publication-title: Power Syst Technol
  contributor:
    fullname: Yujie
– volume: 45
  start-page: 428
  issue: 39
  year: 2015
  end-page: 435
  ident: CR10
  article-title: Feature selection based hybrid anomaly intrusion detection system using k means and rbf kernel function
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2015.03.174
  contributor:
    fullname: Padiya
– volume: 5
  start-page: 689
  issue: 4
  year: 2013
  end-page: 696
  ident: CR8
  article-title: Improved semi-supervised fuzzy clustering algorithm and application in effective intrusion detection system
  publication-title: Int J Adv Comput Technol
  contributor:
    fullname: Paul
– volume: 127
  start-page: 345
  issue: 1
  year: 2016
  end-page: 351
  ident: CR2
  article-title: A minimum enclosing ball-based support vector machine approach for detection of phishing websites
  publication-title: Optik Int J Light Electron Opt
  doi: 10.1016/j.ijleo.2015.10.078
  contributor:
    fullname: Ding
– volume: 98
  start-page: 1574
  issue: 9
  year: 2018
  end-page: 1584
  ident: CR9
  article-title: On regularity for an Ericksen-Leslie’s parabolic-hyperbolic liquid crystals model
  publication-title: Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik
  doi: 10.1002/zamm.201700080
  contributor:
    fullname: Liu
– volume: 30
  start-page: 353
  issue: 6–7
  year: 2011
  end-page: 375
  ident: CR1
  article-title: Data preprocessing for anomaly based network intrusion detection: a review
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2011.05.008
  contributor:
    fullname: Clark
– volume: 4
  start-page: 753
  issue: 4
  year: 2013
  end-page: 762
  ident: CR12
  article-title: A hybrid network intrusion detection framework based on random forests and weighted k-means
  publication-title: Ain Shams Eng J
  doi: 10.1016/j.asej.2013.01.003
  contributor:
    fullname: Eltobely
– volume: 34
  start-page: 398
  issue: 2
  year: 2018
  end-page: 403
  ident: CR7
  article-title: Global regularity for a 2D model of electro-kinetic fluid in a bounded domain
  publication-title: Acta Math Appl Sin Engl Ser
  doi: 10.1007/s10255-018-0740-3
  contributor:
    fullname: Liu
– volume: 2016
  start-page: 1
  issue: 128
  year: 2016
  end-page: 8
  ident: CR6
  article-title: Blow-up criteria of smooth solutions to a 3D model of electro-kinetic fluids in a bounded domain
  publication-title: Electron J Diff Equ
  contributor:
    fullname: Liu
– volume: 121
  start-page: 265
  issue: 18
  year: 2013
  end-page: 273
  ident: CR15
  article-title: Effects-based feature identification for network intrusion detection
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2013.04.038
  contributor:
    fullname: Liu
– volume: 58
  start-page: 1280
  issue: 6
  year: 2015
  end-page: 1292
  ident: CR11
  article-title: Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks
  publication-title: Comput J
  doi: 10.1093/comjnl/bxu036
  contributor:
    fullname: Jiang
– volume: 121
  start-page: 265
  issue: 18
  year: 2013
  ident: 2899_CR15
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2013.04.038
  contributor:
    fullname: P Louvieris
– volume: 3700
  start-page: 144
  issue: 4
  year: 2005
  ident: 2899_CR14
  publication-title: Lect Notes Comput Sci
  doi: 10.1007/11574798_8
  contributor:
    fullname: S Rawat
– volume: 127
  start-page: 345
  issue: 1
  year: 2016
  ident: 2899_CR2
  publication-title: Optik Int J Light Electron Opt
  doi: 10.1016/j.ijleo.2015.10.078
  contributor:
    fullname: Y Li
– volume: 37
  start-page: 2675
  issue: 9
  year: 2013
  ident: 2899_CR3
  publication-title: Power Syst Technol
  contributor:
    fullname: W Yufei
– volume: 30
  start-page: 353
  issue: 6–7
  year: 2011
  ident: 2899_CR1
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2011.05.008
  contributor:
    fullname: JJ Davis
– volume: 5
  start-page: 689
  issue: 4
  year: 2013
  ident: 2899_CR8
  publication-title: Int J Adv Comput Technol
  contributor:
    fullname: I Kister
– volume: 2016
  start-page: 1
  issue: 128
  year: 2016
  ident: 2899_CR6
  publication-title: Electron J Diff Equ
  contributor:
    fullname: M Chen
– volume: 34
  start-page: 398
  issue: 2
  year: 2018
  ident: 2899_CR7
  publication-title: Acta Math Appl Sin Engl Ser
  doi: 10.1007/s10255-018-0740-3
  contributor:
    fullname: Miaochao Chen
– volume: 15
  start-page: 37
  issue: 1
  year: 2014
  ident: 2899_CR5
  publication-title: Egypt Inform J
  doi: 10.1016/j.eij.2013.10.003
  contributor:
    fullname: GV Nadiammai
– volume: 45
  start-page: 428
  issue: 39
  year: 2015
  ident: 2899_CR10
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2015.03.174
  contributor:
    fullname: U Ravale
– volume: 55
  start-page: 212
  year: 2014
  ident: 2899_CR4
  publication-title: Measurement
  doi: 10.1016/j.measurement.2014.04.034
  contributor:
    fullname: S Shamshirband
– volume: 98
  start-page: 1574
  issue: 9
  year: 2018
  ident: 2899_CR9
  publication-title: Zamm-Zeitschrift fur Angewandte Mathematik und Mechanik
  doi: 10.1002/zamm.201700080
  contributor:
    fullname: Lu Shengqi
– volume: 9
  start-page: 31
  issue: 1
  year: 2015
  ident: 2899_CR13
  publication-title: IEEE Syst J
  doi: 10.1109/JSYST.2013.2294120
  contributor:
    fullname: MA Faisal
– volume: 58
  start-page: 1280
  issue: 6
  year: 2015
  ident: 2899_CR11
  publication-title: Comput J
  doi: 10.1093/comjnl/bxu036
  contributor:
    fullname: G Han
– volume: 4
  start-page: 753
  issue: 4
  year: 2013
  ident: 2899_CR12
  publication-title: Ain Shams Eng J
  doi: 10.1016/j.asej.2013.01.003
  contributor:
    fullname: RM Elbasiony
SSID ssj0004373
Score 2.3396177
Snippet Intrusion detection technology plays an important role in ensuring information security. This paper briefly describes the intrusion detection technology and...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 5521
SubjectTerms Algorithms
Compilers
Computer Science
Data mining
Data transmission
Interpreters
Intrusion detection systems
Processor Architectures
Programming Languages
Title Power information network intrusion detection based on data mining algorithm
URI https://link.springer.com/article/10.1007/s11227-019-02899-2
https://www.proquest.com/docview/2409875314
Volume 76
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagXVgoT1EolQc2cNU4cZyMLWqpeFQMrVSmyE9A0BRBWPj1nPNQxGtgvURWcvb57tPdd4fQiVY2VtaGJPQpABTfWiJDzok0hmlJQ64Cx3e-mYaTeXC5YIuax50Xu1cZyfyirrluHqWuSjImLjkWE7h3myXxtDm4uLsa1XRIv0gsx4CMIhbQkivz-ypf_VEdZH7Li-buZtxCs4q0U1SZPPXeM9lTHz97OP7nT7bQZhl-4kFxXrbRmkl3UKsa7YBLS99F17duehou26q6zcNpUTAOMsfTcBJtsryQK8XOF2rsRCITeJkPncDi-X71-pg9LPfQfDyanU9IOXiBKLDIjBgNOMNyH8Be3xoueGT7zDKqA8kjxhS3FL5cagPBlgEAw7XyuFCe5dqKWEX-Pmqkq9QcIAz3BwMbjyWVLJDMExDRBdpYT_uRsCZso9NK_clL0V8jqTspO0UloKgkV1RC26hT7VBS2tpbAjFJ7FCXF7TRWaXx-vHfqx3-7_UjtEEd2M5rdTuoAco2xxCRZLILJ3A8HE675UnsovU5HXwCDjLZhg
link.rule.ids 315,783,787,27936,27937,41093,41535,42162,42604,52123,52246
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8NAEB1ED3rxW6xW3YM3XWg22WxyLGKp2hYPLfS27KcKNhWb_4-zaUJQ9OB1ExbysrMzj5k3A3Btjc-N9ylNY4YEJfae6lQIqp3jVrNUmCTonceTdDhLHud8XovCVk21e5OSrG7qVuwWMRbKJHMasmM5xYt3K_RXDx3zZ6zfqiHjdV45R2KU8YTVUpnf9_jujtoY80datPI2g33YrcNE0l__1wPYcMUh7DUjGEhtkUcweg5Tzkjd_jSATIp1YTeuBT1FWLGurAquChJ8liVhSZWKLKrhEES9vyw_38rXxTHMBvfTuyGtByRQg5ZTUmeRD3gRIynreSeUyHyPe85sokXGuRGe4Wdq6zAockg0hDWRUCbywnqVmyw-gc1iWbhTIGjnHG0x10zzRPNIYeSVWOcjG2fKu7QDNw1O8mPdB0O2HY8DqhJRlRWqknWg20Apa5tYSYwd8sCOoqQDtw287eO_dzv73-tXsD2cjkdy9DB5OocdFghyVV_bhU0E3l1gFFHqy-rQfAHw0b34
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDLbQJiEujKcYDMiBGxRo2jTtcYKNx2DiABKcqjwBwQqCcuHX4_ShAoID4ppUUeoktj_Znw2wpZVNlLWRFwUUAUpgrScjzj1pDNOSRlyFju98Po6Or8LTa3b9icVfZLvXIcmS0-CqNGX53rO2ew3xzafUpUwmnouUJR4q4XboKiO1oN0_uhkNGm5kUEaZE4RJMQtpRZz5eZWvxqnxOL8FSQvbM-yAqHddppw87L7lcle9fyvo-J_fmoPZyjEl_fImzcOUyRagUzd9IJUOWISzC9dXjVQFV92xkqxMJccxx-BwI9rkRYpXRpyV1MQNiVyQSdGOgojH26eX-_xusgRXw8HlwbFXtWTwFL7V3DMaEYjlAcLAfWu44LHdZ5ZRHUoeM6a4pbhzqQ26YQahDdfK50L5lmsrEhUHy9DKnjKzAgQ1C8PXn0gqWSiZL9DXC7Wxvg5iYU3Uhe36LNLnsvJG2tRYdoJKUVBpIaiUdqFXH1davcLXFL2VxOExP-zCTi39Zvr31Vb_9vkmTF8cDtOzk_FoDWaoQ-RFQm8PWih3s45uSy43qpv5AaYW49k
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Power+information+network+intrusion+detection+based+on+data+mining+algorithm&rft.jtitle=The+Journal+of+supercomputing&rft.au=Zuo%2C+Xiaojun&rft.au=Chen%2C+Ze&rft.au=Dong%2C+Limian&rft.au=Chang%2C+Jie&rft.date=2020-07-01&rft.pub=Springer+US&rft.issn=0920-8542&rft.eissn=1573-0484&rft.volume=76&rft.issue=7&rft.spage=5521&rft.epage=5539&rft_id=info:doi/10.1007%2Fs11227-019-02899-2&rft.externalDocID=10_1007_s11227_019_02899_2
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0920-8542&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0920-8542&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0920-8542&client=summon