{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:43Z","timestamp":1750220683426,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T00:00:00Z","timestamp":1606953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,3]]},"DOI":"10.1145\/3452940.3452985","type":"proceedings-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T15:28:53Z","timestamp":1621265333000},"page":"233-237","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Review on The Collection Technology of Station Network Equipment Status Based on Power Plant Side"],"prefix":"10.1145","author":[{"given":"Fan","family":"Yang","sequence":"first","affiliation":[{"name":"State Grid Gansu Electric, Power Research Institute, Lanzhou, China"}]},{"given":"Rong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Science, Xi'an Polytechnic University, Xi'an, China"}]},{"given":"Yanting","family":"Lv","sequence":"additional","affiliation":[{"name":"State Grid Gansu Electric, Power Research Institute, Lanzhou, China"}]},{"given":"Jinxiong","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Grid Gansu Electric, Power Research Institute, Lanzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,5,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"281","article-title":"Research on flow identification technology in new energy plants and stations[J]","volume":"1","author":"Su L. P.","year":"2020","unstructured":"L. P. Su , S. Y. Han . Research on flow identification technology in new energy plants and stations[J] . Application Research of Computers . 2020 , ( A1 ): 281 -- 282 . L. P. Su, S. Y. Han. Research on flow identification technology in new energy plants and stations[J]. Application Research of Computers. 2020, (A1): 281--282.","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.12.035"},{"issue":"6","key":"e_1_3_2_1_3_1","first-page":"29","article-title":"Research on the security collection of new energy power plant dispatch data based on Beidou power application[J]","volume":"36","author":"Ma J.","year":"2019","unstructured":"J. Ma , H. Pang , H. T. Nie , Research on the security collection of new energy power plant dispatch data based on Beidou power application[J] . Power Supply and Use . 2019 , 36 ( 6 ): 29 -- 33 . J. Ma, H. Pang, H. T. Nie, et al. Research on the security collection of new energy power plant dispatch data based on Beidou power application[J]. Power Supply and Use. 2019, 36(6): 29--33.","journal-title":"Power Supply and Use"},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"59","article-title":"Research on Network Information Security Risk Analysis and Protection of New Energy Power Station[J]","volume":"11","author":"Dong X.","year":"2020","unstructured":"X. Dong , T. Zhang . Research on Network Information Security Risk Analysis and Protection of New Energy Power Station[J] . Cyberspace Security . 2020 , 11 ( 2 ): 59 -- 65 . X. Dong, T. Zhang. Research on Network Information Security Risk Analysis and Protection of New Energy Power Station[J]. Cyberspace Security. 2020, 11(2): 59--65.","journal-title":"Cyberspace Security"},{"key":"e_1_3_2_1_5_1","first-page":"144","article-title":"Research and implementation of new energy power station network security protection scheme[J]","volume":"8","author":"Wang Q. L.","year":"2020","unstructured":"Q. L. Wang , Y. S. Wang , D. Wang , Research and implementation of new energy power station network security protection scheme[J] . Network Security Technology and Application . 2020 , ( 8 ): 144 -- 145 . Q. L. Wang, Y. S. Wang, D. Wang, et al. Research and implementation of new energy power station network security protection scheme[J]. Network Security Technology and Application. 2020, (8): 144--145.","journal-title":"Network Security Technology and Application"},{"key":"e_1_3_2_1_6_1","volume-title":"Construction and practice of the whole-process management system for safety protection of Qinghai Power Grid power monitoring system[C]\/\/Management Innovation Practice of China's Power Enterprises","author":"Su S. P.","year":"2019","unstructured":"S. P. Su , J. C. Zhao . Construction and practice of the whole-process management system for safety protection of Qinghai Power Grid power monitoring system[C]\/\/Management Innovation Practice of China's Power Enterprises , 2019 . S. P. Su, J. C. Zhao. Construction and practice of the whole-process management system for safety protection of Qinghai Power Grid power monitoring system[C]\/\/Management Innovation Practice of China's Power Enterprises, 2019."},{"issue":"23","key":"e_1_3_2_1_7_1","first-page":"126","article-title":"Methods to improve the safety protection level of the secondary system of new energy power stations[J]","volume":"26","author":"Zheng Z.","year":"2016","unstructured":"Z. Zheng . Methods to improve the safety protection level of the secondary system of new energy power stations[J] . Science and Technology Outlook . 2016 , 26 ( 23 ): 126 . Z. Zheng. Methods to improve the safety protection level of the secondary system of new energy power stations[J]. Science and Technology Outlook. 2016, 26(23): 126.","journal-title":"Science and Technology Outlook"},{"issue":"03","key":"e_1_3_2_1_8_1","first-page":"43","volume":"42","author":"M. Jiang. Considerations and Practice of Network Security Protection for New Energy Power Stations in Three Gorges Group","year":"2019","unstructured":"M. Jiang. Considerations and Practice of Network Security Protection for New Energy Power Stations in Three Gorges Group [J] . Mechanical and Electrical Technology of Hydropower Stations , 2019 , 42 ( 03 ): 43 -- 44 +72. M. Jiang. Considerations and Practice of Network Security Protection for New Energy Power Stations in Three Gorges Group[J]. Mechanical and Electrical Technology of Hydropower Stations, 2019, 42(03): 43--44+72.","journal-title":"Mechanical and Electrical Technology of Hydropower Stations"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIS.2009.53"},{"key":"e_1_3_2_1_10_1","first-page":"906","article-title":"The Application of ICMP Protocol in Network Scanning[C]\/\/Proceedings of the Fourth International Conference on Parallel and Distributed Computing","volume":"904","author":"Jiang W. H.","year":"2003","unstructured":"W. H. Jiang , W. H. Li , and J. Du . The Application of ICMP Protocol in Network Scanning[C]\/\/Proceedings of the Fourth International Conference on Parallel and Distributed Computing , Applications and Technologies , 2003 , 904 -- 906 . W. H. Jiang, W. H. Li, and J. Du. The Application of ICMP Protocol in Network Scanning[C]\/\/Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003, 904--906.","journal-title":"Applications and Technologies"},{"key":"e_1_3_2_1_11_1","volume-title":"Candid: Classifying Assets in Networks by Determining Importance and Dependencies [M]","author":"Marshall S.","year":"2013","unstructured":"S. Marshall . Candid: Classifying Assets in Networks by Determining Importance and Dependencies [M] . University of California at Berkeley , 2013 . S. Marshall. Candid: Classifying Assets in Networks by Determining Importance and Dependencies [M]. University of California at Berkeley, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544023"}],"event":{"name":"ICITEE2020: The 3rd International Conference on Information Technologies and Electrical Engineering","acronym":"ICITEE2020","location":"Changde City Hunan China"},"container-title":["Proceedings of the 3rd International Conference on Information Technologies and Electrical Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452940.3452985","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3452940.3452985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:27Z","timestamp":1750197807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3452940.3452985"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,3]]},"references-count":12,"alternative-id":["10.1145\/3452940.3452985","10.1145\/3452940"],"URL":"https:\/\/doi.org\/10.1145\/3452940.3452985","relation":{},"subject":[],"published":{"date-parts":[[2020,12,3]]},"assertion":[{"value":"2021-05-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}