检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:史吏 张建峰 王继生 张婷婷 徐英会 SHI Li;ZHANG Jianfeng;WANG Jisheng;ZHANG Tingting;XU Yinghui(State Grid Shandong Electric Power Company Liaocheng Power Supply Company,Liaocheng Shandong,252000,China)
机构地区:[1]国网山东省电力公司聊城供电公司,山东聊城252000
出 处:《长江信息通信》2025年第2期103-105,共3页Changjiang Information & Communications
摘 要:网络安全配置的数据来源广泛,导致在关系抽取过程中难以准确匹配网络安全配置与数据,影响核查精度。基于相似度理论,对分类整合的网络安全配置数据进行分类清洗,以构建清晰的设备网络安全配置拓扑结构。深入分析此结构,运用知识图谱技术抽取网络安全配置与安全漏洞数据之间的关系,对电力监控系统设备网络安全配置状态进行全面评估,输出判定结果,实现电力监控系统设备网络安全配置的核查。结果表明:使用本文方法得到的结果与实际情况完全一致,证明了该方法在评估网络安全配置方面的可靠性。The data sources of network security configuration are extensive,which makes it difficult to accurately match network security configurationand data in the process of relationship extraction,and affects the verification accuracy.Based on the similarity theory,the classified and integrated network security configuration data is cleaned to build a clear network security configuration topology.After in-depth analysis of this structure,knowledge graph technology is used to extract the relationship between network security configuration and security vulnerability data,and the network security configuration status of power monitoring system equipment is comprehensively evaluated,and the judgment results are output to realize the verification of network security configuration of power monitoring system equipment.The results show that the results obtained by this method are consistent with the actual situation,which proves the reliability of this method in evaluating network security configuration.
关 键 词:知识图谱 电力监控系统 设备网络安全 配置核查 拓扑结构
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.198