2015
DOI: 10.2174/1874444301507011834
|View full text |Cite
|
Sign up to set email alerts
|

Research of Power Online Security Auxiliary Decision System Based on Matlab Simulation

Abstract: The parsing problems are due to the difference among COMTRADE standards, unreadable code in remote transmission and incompleteness of data in the power system. This paper presents an algorithm that can correctly parse the file in the Matlab format to the greatest extent. The algorithm includes the error pre-analysis part and the fault-tolerance parsing part. With the method of line-skipping parsing and validation, the error pre-analysis part can find all sorts of error that can influence the proper parsing and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Software vulnerabilities, also called vulnerabilities, usually refer to the defects existing in computer system software or problems arising in the process of system use. According to the de nition of CVE, an authoritative vulnerability publishing organization, a vulnerability is a computational logic error found in software and some hardware components (for example, rmware) that, when exploited by an attacker, will adversely a ect one of the three elements of information security (con dentiality, integrity, availability) [2]. By exploiting the vulnerability, an attacker can obtain access to the system or network, thus performing malicious acts [3].…”
Section: Introductionmentioning
confidence: 99%
“…Software vulnerabilities, also called vulnerabilities, usually refer to the defects existing in computer system software or problems arising in the process of system use. According to the de nition of CVE, an authoritative vulnerability publishing organization, a vulnerability is a computational logic error found in software and some hardware components (for example, rmware) that, when exploited by an attacker, will adversely a ect one of the three elements of information security (con dentiality, integrity, availability) [2]. By exploiting the vulnerability, an attacker can obtain access to the system or network, thus performing malicious acts [3].…”
Section: Introductionmentioning
confidence: 99%