Analysis on Network Information Security Protection Technology of Intelligent Terminal Power Monitoring System of Substation under the Support of Multimodal Multimedia Information

被引:2
|
作者
Jiang, Yakun [1 ]
Wang, Binquan [1 ]
机构
[1] Yunnan Elect Power Dispatching & Control Ctr, Kunming 650011, Yunnan, Peoples R China
关键词
Compendex;
D O I
10.1155/2023/8607305
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
According to the perspective of multimode multimedia data, the protection technology of network information security is mainly discussed. The theoretical basic research is outlined, its meaning, level, reasons, and consequences are expounded, and the future research content and development trend are discussed. With the rapid development of online services and mobile technology, the world has entered the era of multimedia big data. There have been a large number of scientific studies in the multimedia industry, which explain the various fields of big data, including the capture, storage, reference, excavation, and search of multimedia big data. The article expounds the specific concept of power monitoring system network information security, establishes the safety regulations of electric power monitoring system, formulates the corresponding ideas for the safety guarantee level of electric power monitoring system, and promotes the long-term development of China's electric power enterprises. The safe operation of the power monitoring system is directly related to the stable operation of all power supply systems and even the social economy. At this stage, the situation of network security management in China's power monitoring system is still not optimistic. We take the multimode multimedia data, organize the research dynamics of the network security protection technology, and discuss the future research trend.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Research on Network Security Technology of Internet of Things Intelligent Information Terminal under the Background of Information Technology
    Liu L.
    Qian J.
    Zhou A.
    Zhang B.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [2] The Security Protection and Technology Analysis of Information System
    Wang, Hua
    Zhao, GuoHong
    Shi, BoShan
    Meng, XianJun
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3130 - 3134
  • [3] Network information content security: A framework for intelligent analysis and monitoring
    Zhao, YP
    Zhao, JZ
    Xu, RS
    2005 INTERNATIONAL CONFERENCE ON SERVICES SYSTEMS AND SERVICES MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2005, : 841 - 843
  • [4] Network Security Technology of Intelligent Information Terminal Based on Mobile Internet of Things
    Sun, Ning
    Li, Tao
    Song, Gongfei
    Xia, Haoran
    MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [5] Application of WLAN Information Transmission and System Security Technology in the Smart Substation Network
    Xu, Xin
    Lu, Jinxi
    ADVANCES IN APPLIED MATERIALS AND ELECTRONICS ENGINEERING II, 2013, 684 : 551 - +
  • [6] Research on Network Security Management and Protection Technology of Information System
    Xu, Raoshan
    INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 1036 - 1042
  • [7] An intelligent multimedia information system for multimodal content extraction and querying
    Adnan Yazici
    Murat Koyuncu
    Turgay Yilmaz
    Saeid Sattari
    Mustafa Sert
    Elvan Gulen
    Multimedia Tools and Applications, 2018, 77 : 2225 - 2260
  • [8] An intelligent multimedia information system for multimodal content extraction and querying
    Yazici, Adnan
    Koyuncu, Murat
    Yilmaz, Turgay
    Sattari, Saeid
    Sert, Mustafa
    Gulen, Elvan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (02) : 2225 - 2260
  • [9] Intelligent information inquiring system supported by multimedia technology
    Chen, F
    Yang, BZ
    ICSP '96 - 1996 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1996, : 809 - 812
  • [10] Application of Clipboard Monitoring Technology in Graphic and Document Information Security Protection System
    Li, Shaobo
    Lv, Shulin
    Jia, Xiaohui
    Shao, Zhisheng
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 423 - 426