Articles with "network security" as a keyword



Photo from wikipedia

Network security situation assessment with network attack behavior classification

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22867

Abstract: To solve the problems that existing network security situation assessment (NSSA) methods are difficult to extract features and have poor timeliness, an NSSA method with network attack behavior classification (NABC) is proposed. First, an NABC… read more here.

Keywords: network; network attack; attack behavior; situation ... See more keywords
Photo from wikipedia

Wireless Network Security Based on the Image Address Masking (IAM) Mechanism

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-018-5664-y

Abstract: Addressing plays vital role in the communication of wired and wireless network. We proposed masking of internet protocol (IP) address by using the image abstraction of the mobile user. Every image is with independent Gray… read more here.

Keywords: image; network security; network; mechanism ... See more keywords
Photo from wikipedia

Distributed network security framework of energy internet based on internet of things

Sign Up to like & get
recommendations!
Published in 2021 at "Sustainable Energy Technologies and Assessments"

DOI: 10.1016/j.seta.2021.101051

Abstract: Abstract This paper considers that energy Internet is the future development direction of power system, which solves the problems of clean energy compatibility and deep and efficient control of power system. The research and practice… read more here.

Keywords: network security; energy internet; security; energy ... See more keywords
Photo from wikipedia

Establishing an Intelligent Transportation System With a Network Security Mechanism in an Internet of Vehicle Environment

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2752420

Abstract: The Internet of Vehicle (IoV) utilizes networks to conduct message exchange and related services or application. In recent years, smart cities and IoVs have become areas of interest in the new generation Internet of Things… read more here.

Keywords: transportation; transportation system; network security; paper ... See more keywords
Photo from wikipedia

Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2940822

Abstract: The wirelessly connected intelligent robot swarms are more vulnerable to be attacked due to their unstable network connection and limited resources, and the consequences of being attacked are more serious than other systems. Therefore, the… read more here.

Keywords: network security; robot swarms; connected intelligent; network ... See more keywords
Photo by austinchan from unsplash

Differential Game Analysis of Enterprises Investing in New Infrastructure and Maintaining Social Network Security Under the Digital Innovation Ecosystem

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3187523

Abstract: With the new round of industrial and technological revolution in China, the new normal of the Chinese economy is increasingly in the form of a digital economy characterized by continued growth and development potential. The… read more here.

Keywords: social network; innovation; network security; digital innovation ... See more keywords
Photo by scottwebb from unsplash

Network Security Situation Assessment Based on Improved WOA-SVM

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204663

Abstract: Network security situation assessment is an important means of understanding the current network security situation to provide a basis for taking security measures. To address the problem that the accuracy of existing network security situation… read more here.

Keywords: security situation; assessment; network security; security ... See more keywords
Photo by clemono from unsplash

IDPS Signature Classification Based on Active Learning With Partial Supervision From Network Security Experts

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3211651

Abstract: As intrusion detection and prevention systems (IDPSs) grow in importance, the cost of managing signatures, which are pattern files of malicious communications, continues to increase. To ensure the optimal operation of an IDPS, network security… read more here.

Keywords: system; security experts; based active; classification ... See more keywords
Photo by scottwebb from unsplash

A Network Security Situation Element Extraction Method Based on Conditional Generative Adversarial Network and Transformer

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3212751

Abstract: Recently, the massive increase in network users has dramatically increased network traffic, making it more difficult to maintain network security. The task of network security situation element extraction is to detect and classify network traffic.… read more here.

Keywords: network; security situation; extraction; situation element ... See more keywords
Photo by alterego_swiss from unsplash

Cybersecurity Status Assessment of Cloud Manufacturing Systems Based on Semiquantitative Information

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3253393

Abstract: The network security status assessment (NSSA) method can evaluate the network security status of cloud manufacturing systems (CMSs), which is of great significance to reduce the network security risk and loss of CMSs. At present,… read more here.

Keywords: semiquantitative information; cmss; status; security ... See more keywords
Photo by szolkin from unsplash

IBCS: Intent-Based Cloud Services for Security Applications

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.001.1900476

Abstract: As the number of network devices is increasing and they are highly connected, network attacks have become more complex and varied. To mitigate these attacks, multiple types of network security equipment are used in combination,… read more here.

Keywords: network security; security equipment; services security; security ... See more keywords