{"title":"Research On the Current Situation and Technical Exploration of Network Security in Power Monitoring System","authors":"Lulu Wang, Zhijun Wang","doi":"10.62051/96h2c650","DOIUrl":null,"url":null,"abstract":"This paper analyzes the current situation of the network security of the power monitoring system, and discusses the weak link in the network security protection of the power monitoring system from the perspective of technical exploration. From the perspective of application, the application of trusted computing technology and malicious code technology in the security protection system of power monitoring system is discussed, so as to further ensure the network security of power monitoring system.","PeriodicalId":509968,"journal":{"name":"Transactions on Computer Science and Intelligent Systems Research","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Computer Science and Intelligent Systems Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.62051/96h2c650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper analyzes the current situation of the network security of the power monitoring system, and discusses the weak link in the network security protection of the power monitoring system from the perspective of technical exploration. From the perspective of application, the application of trusted computing technology and malicious code technology in the security protection system of power monitoring system is discussed, so as to further ensure the network security of power monitoring system.