• Journal of Terahertz Science and Electronic Information Technology
  • Vol. 23, Issue 2, 175 (2025)
WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, and XU Weijie
Author Affiliations
  • Information and Communication Technology Co, LTD, China Southern Power Grid Digital Grid Group, Guangzhou Guangdong 510670, China
  • show less
    DOI: 10.11805/tkyda2023276 Cite this Article
    WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, XU Weijie. Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals[J]. Journal of Terahertz Science and Electronic Information Technology , 2025, 23(2): 175 Copy Citation Text show less
    References

    [4] PAVASKAR M, KAKADE S, GOND S, et al. Security and intrusion detection in mobile ad hoc network[J]. Journal of Mechanics and MEMS, 2020, 12(1): 27-32.

    WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, XU Weijie. Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals[J]. Journal of Terahertz Science and Electronic Information Technology , 2025, 23(2): 175
    Download Citation