Open Access

Exploration and Practice of Civic Teaching in Cybersecurity Technology Specialized Courses under the Background of Big Data

  
Sep 03, 2024

Cite
Download Cover

Wolf, W., White, G. B., Fisch, E. A., Crago, S. P., Pooch, U. W., McMahon, J. O., ... & Lebak, J. M. (2017). Computer system and network security. CRC press. Search in Google Scholar

Zeng, H., Liu, Z., & Cai, H. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing. Search in Google Scholar

Lu, Z., Qu, G., & Liu, Z. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), 760-776. Search in Google Scholar

Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors, 22(13), 4730. Search in Google Scholar

Lin, H., Yan, Z., Chen, Y., & Zhang, L. (2018). A survey on network security-related data collection technologies. IEEE Access, 6, 18345-18365. Search in Google Scholar

Ouda, A. J., Yousif, A. N., Hasan, A. S., Ibrahim, H. M., & Shyaa, M. A. (2022). The impact of cloud computing on network security and the risk for organization behaviors. Webology, 19(1), 195-206. Search in Google Scholar

Tang, Y., & Elhoseny, M. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204. Search in Google Scholar

Vanerio, J., & Casas, P. (2017, August). Ensemble-learning approaches for network security and anomaly detection. In Proceedings of the workshop on big data analytics and machine learning for data communication networks (pp. 1-6). Search in Google Scholar

Saxena, N., Grijalva, S., Chukwuka, V., & Vasilakos, A. V. (2017). Network security and privacy challenges in smart vehicle-to-grid. IEEE Wireless Communications, 24(4), 88-98. Search in Google Scholar

Dolan, E., & Widayanti, R. (2022). Implementation of authentication systems on hotspot network users to improve computer network security. International Journal of Cyber and IT Service Management, 2(1), 88-94. Search in Google Scholar

Sagduyu, Y. E., Shi, Y., & Erpek, T. (2019, June). IoT network security from the perspective of adversarial deep learning. In 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1-9). IEEE. Search in Google Scholar

Li, Y., Huang, G. Q., Wang, C. Z., & Li, Y. C. (2019). Analysis framework of network security situational awareness and comparison of implementation methods. EURASIP Journal on Wireless Communications and Networking, 2019, 1-32. Search in Google Scholar

Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177. Search in Google Scholar

Dadheech, K., Choudhary, A., & Bhatia, G. (2018, April). De-militarized zone: A next level to network security. In 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) (pp. 595-600). IEEE. Search in Google Scholar

Waqas, M., Tu, S., Halim, Z., Rehman, S. U., Abbas, G., & Abbas, Z. H. (2022). The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artificial Intelligence Review, 55(7), 5215-5261. Search in Google Scholar

Ren, J. (2020). Construction of Personnel Training System Under School-Enterprise Joint Training Mode–Taking Personnel Training of “Network Space Security Major” as an Example. In Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 2 (pp. 145-152). Springer International Publishing. Search in Google Scholar

He, W., & Zhang, Z. (2019). Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), 249-257. Search in Google Scholar

Reimers, K., & Andersson, D. (2017). Post-secondary education network security: the end user challenge and evolving threats. In ICERI2017 Proceedings (pp. 1787-1796). IATED. Search in Google Scholar

Naagas, M. A., & Palaoag, T. D. (2018, February). A threat-driven approach to modeling a campus network security. In Proceedings of the 6th International Conference on Communications and Broadband Networking (pp. 6-12). Search in Google Scholar

Prabawa, H. W., Junaeti, E., & Permana, Y. (2017, October). Using capture the flag in classroom: Game-based implementation in network security learning. In 2017 3rd International Conference on Science in Information Technology (ICSITech) (pp. 690-695). IEEE. Search in Google Scholar

Kislyakov, P., & Shmeleva, E. (2018). Media education in training students to provide information and psychological security. Медиаобразование, (1), 107-116. Search in Google Scholar

Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information sciences, 421, 43-69. Search in Google Scholar

Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges within Industry 4.0 paradigm. Procedia manufacturing, 13, 1253-1260. Search in Google Scholar

Huiju Yi, Shengcai Zhang, Dezhi An & Zhenyu Liu.(2024).PatchesNet: PatchTST-based multi-scale network security situation prediction.Knowledge-Based Systems112037-. Search in Google Scholar

Bingying Shi.(2024).On the Organic Integration of College Students’ Mental Health Education and Curriculum Ideology and Politics.Region - Educational Research and Reviews(4). Search in Google Scholar

Amir Hussain,Kifayat Ullah,Tapan Senapati & Sarbast Moslem.(2024).Energy supplier selection by TOPSIS method based on multi-attribute decision-making by using novel idea of complex fuzzy rough information.Energy Strategy Reviews101442-. Search in Google Scholar

Jixin Zhang,Shihao Zhang,Jianyu Qiao,Jiahui Wei,Lan Wang,Zhonghao Li & Jincan Zhuo.(2024).Safety resilience evaluation of hydrogen refueling stations based on improved TOPSIS approach.International Journal of Hydrogen Energy396-405. Search in Google Scholar

Language:
English