Open Access

Optimization of network security protection posture based on data clustering

   | Feb 26, 2024

Cite

Ghiasi, M., Wang, Z., Mehrandezh, M., Niknam, T., Dehghani, M., & Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electric Power Systems Research. Search in Google Scholar

Pargoo, N. S., & Ilbeigi, M. (2023). A scoping review for cybersecurity in the construction industry. Journal of management in engineering. Search in Google Scholar

Shortridge, K., & Dykstra, J. (2023). Opportunity cost and missed chances in optimizing cybersecurity. Communications of the ACM. Search in Google Scholar

Yan, F., Wen, S., Nepal, S., Paris, C., & Xiang, Y. (2022). Explainable machine learning in cybersecurity: a survey. International Journal of Intelligent Systems, 37(12), 12305-12334. Search in Google Scholar

Ignaczak, L., Goldschmidt, G., Cristiano André Da Costa, & Righi, R. D. R. (2022). Text mining in cybersecurity: a systematic literature review. ACM computing surveys. Search in Google Scholar

Haleem, A., Javaid, M., Singh, R. P., Rab, S., & Suman, R. (2022). Perspectives of cybersecurity for ameliorative industry 4.0 era: a review-based framework. Industrial Robot(3), 49. Search in Google Scholar

Tsao, K. Y., Girdler, T., & Vassilakis, V. G. (2022). A survey of cyber security threats and solutions for uav communications and flying ad-hoc networks. Ad hoc networks(Aug.), 133. Search in Google Scholar

Latino, M. E., & Menegoli, M. (2022). Cybersecurity in the food and beverage industry: a reference framework. Computers in Industry(141-), 141. Search in Google Scholar

Corallo, A., Lazoi, M., Lezzi, M., & Luperto, A. (2022). Cybersecurity awareness in the context of the industrial Internet of things: a systematic literature review. Computers in Industry(137-), 137. Search in Google Scholar

Pawlicki, M., Kozik, R., & Choras, M. (2022). A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing. Search in Google Scholar

Rana, P., & Patil, B. P. (2023). Cyber security threats in iot: a review. Journal of high speed networks. Search in Google Scholar

Shillair, R., Esteve-Gonzalez, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & Von Solms, B. (2022). Cyb ersecurity e ducation, awareness raising, and training initiatives: national level evidence-based results, challenges, and promise. Computers & Security(119-), 119. Search in Google Scholar

Karjalainen, M., & Ojala, A. L. (2023). Authentic learning environments for in-service training in cybersecurity: a qualitative study. International journal of continuing engineering education and life-long learning. Search in Google Scholar

Kaur, R., Gabrijelcic, D., & Klobucar, T. (2023). Artificial intelligence for cybersecurity: literature review and future research directions. Information Fusion. Search in Google Scholar

Parker, S., Wu, Z., & Christofides, P. D. (2023). Cybersecurity in process control, operations, and supply chain. Computers & Chemical Engineering, 171, 108169-. Search in Google Scholar

O’Brien, P. (2022). Five things to know about cybersecurity in process safety. Chemical Engineering Progress(12), 118. Search in Google Scholar

Wang, X., & Liu, J. (2023). A novel feature integration and entity boundary detection for named entity recognition in cybersecurity. Knowledge-based systems. Search in Google Scholar

Jana, D. P., Shukla, A. M., & Gupta, S. (2022). K-means algorithm-based detection for wavelength division multiplexed ook pd-noma system over turbulent optical channel. Optical Engineering, 61(3), -. Search in Google Scholar

Moodi, F., & Saadatfar, H. (2022). An improved k-means algorithm for big data. IET Software, 16(1). Search in Google Scholar

eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics