Sign Up to like & get
recommendations!
1
Published in 2019 at "Europe-Asia Studies"
DOI: 10.1080/09668136.2019.1690634
Abstract: Abstract Since Russia’s military intervention in Ukraine in 2014, the security situation of Europe’s eastern ‘frontline states’ has undergone significant changes. In and around the Black Sea, the Baltic Sea and the Barents Sea, the…
read more here.
Keywords:
sea;
security;
russia western;
security situation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2939490
Abstract: The support vector machine (SVM) is verified to be effective for predicting cyber security situations, however, the long training time of the prediction model is a drawback to its use. To address this, a cyber…
read more here.
Keywords:
security situation;
situation prediction;
model;
prediction ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3204663
Abstract: Network security situation assessment is an important means of understanding the current network security situation to provide a basis for taking security measures. To address the problem that the accuracy of existing network security situation…
read more here.
Keywords:
security situation;
assessment;
network security;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3212751
Abstract: Recently, the massive increase in network users has dramatically increased network traffic, making it more difficult to maintain network security. The task of network security situation element extraction is to detect and classify network traffic.…
read more here.
Keywords:
network;
security situation;
extraction;
situation element ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Computational and Mathematical Methods in Medicine"
DOI: 10.1155/2022/3735016
Abstract: In order to strengthen the management and security status monitoring of the internal network of medical units and make up for security vulnerabilities in time, an ad hoc network link security situation identification method is…
read more here.
Keywords:
security situation;
hoc network;
identification;
security ... See more keywords