Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22867
Abstract: To solve the problems that existing network security situation assessment (NSSA) methods are difficult to extract features and have poor timeliness, an NSSA method with network attack behavior classification (NABC) is proposed. First, an NABC…
read more here.
Keywords:
network;
network attack;
attack behavior;
situation ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "Wireless Personal Communications"
DOI: 10.1007/s11277-018-5664-y
Abstract: Addressing plays vital role in the communication of wired and wireless network. We proposed masking of internet protocol (IP) address by using the image abstraction of the mobile user. Every image is with independent Gray…
read more here.
Keywords:
image;
network security;
network;
mechanism ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Sustainable Energy Technologies and Assessments"
DOI: 10.1016/j.seta.2021.101051
Abstract: Abstract This paper considers that energy Internet is the future development direction of power system, which solves the problems of clean energy compatibility and deep and efficient control of power system. The research and practice…
read more here.
Keywords:
network security;
energy internet;
security;
energy ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2752420
Abstract: The Internet of Vehicle (IoV) utilizes networks to conduct message exchange and related services or application. In recent years, smart cities and IoVs have become areas of interest in the new generation Internet of Things…
read more here.
Keywords:
transportation;
transportation system;
network security;
paper ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2940822
Abstract: The wirelessly connected intelligent robot swarms are more vulnerable to be attacked due to their unstable network connection and limited resources, and the consequences of being attacked are more serious than other systems. Therefore, the…
read more here.
Keywords:
network security;
robot swarms;
connected intelligent;
network ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3187523
Abstract: With the new round of industrial and technological revolution in China, the new normal of the Chinese economy is increasingly in the form of a digital economy characterized by continued growth and development potential. The…
read more here.
Keywords:
social network;
innovation;
network security;
digital innovation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204663
Abstract: Network security situation assessment is an important means of understanding the current network security situation to provide a basis for taking security measures. To address the problem that the accuracy of existing network security situation…
read more here.
Keywords:
security situation;
assessment;
network security;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3211651
Abstract: As intrusion detection and prevention systems (IDPSs) grow in importance, the cost of managing signatures, which are pattern files of malicious communications, continues to increase. To ensure the optimal operation of an IDPS, network security…
read more here.
Keywords:
system;
security experts;
based active;
classification ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3212751
Abstract: Recently, the massive increase in network users has dramatically increased network traffic, making it more difficult to maintain network security. The task of network security situation element extraction is to detect and classify network traffic.…
read more here.
Keywords:
network;
security situation;
extraction;
situation element ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3253393
Abstract: The network security status assessment (NSSA) method can evaluate the network security status of cloud manufacturing systems (CMSs), which is of great significance to reduce the network security risk and loss of CMSs. At present,…
read more here.
Keywords:
semiquantitative information;
cmss;
status;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.001.1900476
Abstract: As the number of network devices is increasing and they are highly connected, network attacks have become more complex and varied. To mitigate these attacks, multiple types of network security equipment are used in combination,…
read more here.
Keywords:
network security;
security equipment;
services security;
security ... See more keywords