{"id":"https://openalex.org/W4214831049","doi":"https://doi.org/10.1145/3503181.3503209","title":"Research on Security Protection Warning Model Based on Multiple Data Monitoring","display_name":"Research on Security Protection Warning Model Based on Multiple Data Monitoring","publication_year":2021,"publication_date":"2021-10-16","ids":{"openalex":"https://openalex.org/W4214831049","doi":"https://doi.org/10.1145/3503181.3503209"},"language":"en","primary_location":{"id":"doi:10.1145/3503181.3503209","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3503181.3503209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"5th International Conference on Crowd Science and Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013949909","display_name":"Songhui Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Songhui Zhang","raw_affiliation_strings":["State Grid Shandong Electric Power Research Institute, China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Research Institute, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100614099","display_name":"Liang Guo","orcid":"https://orcid.org/0000-0001-7759-5784"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liang Guo","raw_affiliation_strings":["State Grid Shandong Electric Power Corporation, China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Corporation, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004591926","display_name":"Zhelong Wang","orcid":"https://orcid.org/0000-0003-4959-3372"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhelong Wang","raw_affiliation_strings":["State Grid Shandong Electric Power Corporation, China"],"affiliations":[{"raw_affiliation_string":"State Grid Shandong Electric Power Corporation, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100338076","display_name":"Tao Liu","orcid":"https://orcid.org/0009-0002-9261-6728"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao Liu","raw_affiliation_strings":["Marketing Service Center (Metering Center), State Grid Shandong Electric Power Corporation, China"],"affiliations":[{"raw_affiliation_string":"Marketing Service Center (Metering Center), State Grid Shandong Electric Power Corporation, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013949909"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21217979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"166","last_page":"170"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12451","display_name":"Smart Grid and Power Systems","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14042","display_name":"Technology and Security Systems","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/warning-system","display_name":"Warning system","score":0.7132067084312439},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6886097192764282},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5438173413276672},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5190825462341309},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.5064214468002319},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5053063035011292},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.49791455268859863},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.4462868571281433},{"id":"https://openalex.org/keywords/grid","display_name":"Grid","score":0.4372468590736389},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4359256625175476},{"id":"https://openalex.org/keywords/early-warning-system","display_name":"Early warning system","score":0.43572917580604553},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4148157238960266},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41046270728111267},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22386518120765686},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19951507449150085},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11848706007003784},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.11425277590751648}],"concepts":[{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.7132067084312439},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6886097192764282},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5438173413276672},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5190825462341309},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.5064214468002319},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5053063035011292},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49791455268859863},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.4462868571281433},{"id":"https://openalex.org/C187691185","wikidata":"https://www.wikidata.org/wiki/Q2020720","display_name":"Grid","level":2,"score":0.4372468590736389},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4359256625175476},{"id":"https://openalex.org/C2779296788","wikidata":"https://www.wikidata.org/wiki/Q5326904","display_name":"Early warning system","level":3,"score":0.43572917580604553},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4148157238960266},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41046270728111267},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22386518120765686},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19951507449150085},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11848706007003784},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.11425277590751648},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3503181.3503209","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3503181.3503209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"5th International Conference on Crowd Science and Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.9100000262260437,"id":"https://metadata.un.org/sdg/7"}],"awards":[{"id":"https://openalex.org/G3447241908","display_name":null,"funder_award_id":"2020A-009","funder_id":"https://openalex.org/F4320336324","funder_display_name":"State Grid Shandong Electric Power Company"}],"funders":[{"id":"https://openalex.org/F4320336324","display_name":"State Grid Shandong Electric Power Company","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2352984759","https://openalex.org/W2369899610","https://openalex.org/W2744049993","https://openalex.org/W2897021918","https://openalex.org/W3177137426","https://openalex.org/W3185336750","https://openalex.org/W3191971740","https://openalex.org/W6991355137"],"related_works":["https://openalex.org/W2019221308","https://openalex.org/W2366686155","https://openalex.org/W1044530532","https://openalex.org/W2383173999","https://openalex.org/W2899102479","https://openalex.org/W3125817379","https://openalex.org/W2369926976","https://openalex.org/W2381743810","https://openalex.org/W2349162035","https://openalex.org/W2402451758"],"abstract_inverted_index":{"Due":[0],"to":[1,19,27,100,106,133,142],"the":[2,29,35,73,84,89,94,102,107,112,122,135,159,168,173],"expansion":[3],"of":[4,10,34,39,88,124,172],"data":[5,55,67,77,104],"types":[6],"and":[7,43,72,111,114,126,147,162],"collection":[8],"channels":[9],"power":[11,30],"grid":[12,31,48],"energy":[13,36,50,62,90],"consumption":[14,37,51,63,91],"systems,":[15],"it":[16],"is":[17,57,79,98,118,131],"difficult":[18],"effectively":[20],"monitor":[21],"new":[22],"security":[23,136],"attacks.":[24],"In":[25],"order":[26],"improve":[28],"enterprises'":[32],"perception":[33,56,68,170],"status":[38],"users,":[40],"a":[41],"monitoring":[42,64,96,113,146,161],"early":[44,115,148,163],"warning":[45,116,138,164],"method":[46,97,156],"for":[47],"users'":[49],"based":[52],"on":[53],"multiple":[54,66,169],"proposed.":[58],"First,":[59],"by":[60,166],"collecting":[61],"data,":[65],"characteristics":[69,87],"are":[70],"obtained,":[71],"intrusion":[74],"behavior":[75],"sample":[76],"processing":[78],"performed":[80],"in":[81],"combination":[82,123],"with":[83],"working":[85],"condition":[86],"equipment.":[92],"Subsequently,":[93],"fuzzy":[95],"used":[99,132],"control":[101],"abnormal":[103],"according":[105],"set":[108,119],"authority":[109],"threshold,":[110],"level":[117],"accordingly.":[120],"Finally,":[121],"multi-attention":[125],"GRU":[127],"(Gate":[128],"Recurrent":[129],"Unit)":[130],"construct":[134],"protection":[137],"model,":[139],"so":[140],"as":[141],"realize":[143],"state":[144],"safety":[145],"warning.":[149],"The":[150],"simulation":[151],"result":[152],"showed":[153],"that":[154],"this":[155],"further":[157],"improved":[158],"system's":[160],"accuracy":[165],"improving":[167],"capabilities":[171],"collected":[174],"data.":[175]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
