A concurrent security monitoring method for virtualization environments

2016 ◽  
Vol 13 (1) ◽  
pp. 113-123 ◽  
Author(s):  
Tian Donghai ◽  
Jia Xiaoqi ◽  
Chen Junhua ◽  
Hu Changzhen
2021 ◽  
Vol 2087 (1) ◽  
pp. 012025
Author(s):  
Minzhen Wang ◽  
Ziwen Shang ◽  
Jiankai Guo ◽  
Dongliang Qiao ◽  
Wentao Dai

Abstract Aiming at the problem of low accuracy of traditional methods in transmission corridor line safety monitoring, a transmission corridor line safety monitoring method based on monocular vision is designed. First of all, this article defines the target object of the safety monitoring of the transmission corridor line. Then, based on the monocular vision measurement to obtain the internal parameters of the camera geometry, optical characteristics, etc., the position of the power transmission corridor line security surveillance camera is calibrated, the power transmission corridor line security monitoring graphics are displayed, and the security monitoring data of the transmission corridor line is used for perception and track.Finally, the safety monitoring and early warning of transmission corridor lines are realized. The experimental results show that the monitoring accuracy of the design method is significantly higher than that of the control group, which can solve the problem of low accuracy of transmission corridor line safety monitoring by traditional methods.


2015 ◽  
Vol 9 (3) ◽  
pp. 498-507 ◽  
Author(s):  
Hyun Mi Jung ◽  
Il-Sun Hwang ◽  
Jeong-Kyung Moon ◽  
Hark- Soo Park

2021 ◽  
Vol 1955 (1) ◽  
pp. 012040
Author(s):  
Tianxi Yu ◽  
Xiaoyao Yin ◽  
Menglin Yao ◽  
Tong Liu

2013 ◽  
Author(s):  
Liting Gao ◽  
Lixia Wang ◽  
Zhenyan Wang ◽  
Aihua Qi

2021 ◽  
pp. 1-12
Author(s):  
Yuanyuan Li ◽  
Jidong Sha ◽  
Rongna Geng

In order to overcome the problems of poor data classification accuracy and effectiveness of traditional data monitoring methods, this paper designs a data security monitoring method based on narrow-band Internet of things. Firstly, the model of network data acquisition and sensor node’s optimal configuration is established to collect intranet data. Based on the analysis of data characteristics, dynamic intranet data analysis indexes are designed from three aspects: establishing security incident quantity index, establishing address entropy index and data diversion. According to the above-mentioned narrow-band data aggregation rate, the security index of the Internet of things is calculated to realize the security of monitoring data. The experimental results show that: whether the network attack exists or not, the accuracy rate of the method is always higher than 90%, the classification time is less than 4 s, and the energy consumption of monitoring process is always less than 150 J, which fully proves that the method achieves the design expectation.


Sign in / Sign up

Export Citation Format

Share Document