Journal of Terahertz Science and Electronic Information Technology , Volume. 23, Issue 2, 175(2025)
Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals
[4] [4] PAVASKAR M, KAKADE S, GOND S, et al. Security and intrusion detection in mobile ad hoc network[J]. Journal of Mechanics and MEMS, 2020, 12(1): 27-32.
Get Citation
Copy Citation Text
WANG Jian, FU Zhibo, NONG Caiqin, LIU Jiahao, XU Weijie. Design of optimization algorithm for vulnerability correlation mining of power Internet of Things terminals[J]. Journal of Terahertz Science and Electronic Information Technology , 2025, 23(2): 175
Category:
Received: Sep. 22, 2023
Accepted: Mar. 13, 2025
Published Online: Mar. 13, 2025
The Author Email: