Analysis of the implementation method of network security in the logical security domain of edge power secondary integration equipment | IEEE Conference Publication | IEEE Xplore