Approaches for Memory-Efficient Communication Library and Runtime Communication Optimization

Author(s):  
Takeshi Nanri
2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Yunfa Li ◽  
Qili Zhou

We first propose an efficient communication optimization algorithm in smart grid. Based on the optimization algorithm, we propose an intrusion detection algorithm to detect malicious data and possible cyberattacks. In this scheme, each node acts independently when it processes communication flows or cybersecurity threats. And neither special hardware nor nodes cooperation is needed. In order to justify the feasibility and the availability of this scheme, a series of experiments have been done. The results show that it is feasible and efficient to detect malicious data and possible cyberattacks with less computation and communication cost.


PIERS Online ◽  
2007 ◽  
Vol 3 (4) ◽  
pp. 374-378 ◽  
Author(s):  
Yu Liu ◽  
Ziqiang Yang ◽  
Zheng Liang ◽  
Limei Qi

Sign in / Sign up

Export Citation Format

Share Document