Open Access

Research on Intelligent Network Security Event Detection and Emergency Disposal Technology

  
Mar 31, 2025

Cite
Download Cover

Shin, J., You, I., & Seo, J. T. (2020). Investment priority analysis of ICS information security resources in smart mobile IoT network environment using the analytic hierarchy process. Mobile Information Systems, 2020(3), 1-11. Shin J. You I. Seo J. T. ( 2020 ). Investment priority analysis of ICS information security resources in smart mobile IoT network environment using the analytic hierarchy process . Mobile Information Systems , 2020 ( 3 ), 1 - 11 . Search in Google Scholar

Zhu, J., Huang, W., Miao, F., Su, C., Zhao, B., & Xiong, Y. (2020). A formal framework of shielding systems by stepwise refinement. International Journal of Network Security, 22(1), 54-67. Zhu J. Huang W. Miao F. Su C. Zhao B. Xiong Y. ( 2020 ). A formal framework of shielding systems by stepwise refinement . International Journal of Network Security , 22 ( 1 ), 54 - 67 . Search in Google Scholar

Yamauchi, M., Ohsita, Y., Murata, M., Ueda, K., & Kato, Y. (2020). Anomaly detection in smart home operation from user behaviors and home conditions. IEEE Transactions on Consumer Electronics, 66(99), 183-192. Yamauchi M. Ohsita Y. Murata M. Ueda K. Kato Y. ( 2020 ). Anomaly detection in smart home operation from user behaviors and home conditions . IEEE Transactions on Consumer Electronics , 66 ( 99 ), 183 - 192 . Search in Google Scholar

Yang, W. H. (2020). Security detection of network intrusion: Application of cluster analysis method. Computer Optics, 44(4), 660-664. Yang W. H. ( 2020 ). Security detection of network intrusion: Application of cluster analysis method . Computer Optics , 44 ( 4 ), 660 - 664 . Search in Google Scholar

Zhang, J. (2019). Detection of network protection security vulnerability intrusion based on data mining. International Journal of Network Security, 21(6), 979-984. Zhang J. ( 2019 ). Detection of network protection security vulnerability intrusion based on data mining . International Journal of Network Security , 21 ( 6 ), 979 - 984 . Search in Google Scholar

Zhang, S., Xie, X., & Xu, Y. (2019). Intrusion detection method based on a deep convolutional neural network. Qinghua Daxue Xuebao/Journal of Tsinghua University, 59(1), 44-52. Zhang S. Xie X. Xu Y. ( 2019 ). Intrusion detection method based on a deep convolutional neural network . Qinghua Daxue Xuebao/Journal of Tsinghua University , 59 ( 1 ), 44 - 52 . Search in Google Scholar

Wei, M., Rong, C., Liang, E., & Zhuang, Y. (2022). An intrusion detection mechanism for IPv6-based wireless sensor networks. International Journal of Distributed Sensor Networks, 18(3), 103053-33770. Wei M. Rong C. Liang E. Zhuang Y. ( 2022 ). An intrusion detection mechanism for IPv6-based wireless sensor networks . International Journal of Distributed Sensor Networks , 18 ( 3 ), 103053 - 33770 . Search in Google Scholar

Zhang, H., Li, Y., Lv, Z., Sangaiah, A. K., & Huang, T. (2020). A real-time and ubiquitous network attack detection based on deep belief network and support vector machine. IEEE/CAA Journal of Automatica Sinica, 7(3), 790-799. Zhang H. Li Y. Lv Z. Sangaiah A. K. Huang T. ( 2020 ). A real-time and ubiquitous network attack detection based on deep belief network and support vector machine . IEEE/CAA Journal of Automatica Sinica , 7 ( 3 ), 790 - 799 . Search in Google Scholar

Zavrak, S., & Iskefiyeli, M. (2020). Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access, 8(99), 108346-108358. Zavrak S. Iskefiyeli M. ( 2020 ). Anomaly-based intrusion detection from network flow features using variational autoencoder . IEEE Access , 8 ( 99 ), 108346 - 108358 . Search in Google Scholar

Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. V. N. S., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888-895. Nancy P. Muthurajkumar S. Ganapathy S. Kumar S. V. N. S. Selvi M. Arputharaj K. ( 2020 ). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks . IET Communications , 14 ( 5 ), 888 - 895 . Search in Google Scholar

Siddique, K., Akhtar, Z., Khan, F. A., & Kim, Y. (2019). KDD Cup 99 data sets: A perspective on the role of data sets in network intrusion detection research. Computer, 52(2), 41-51. Siddique K. Akhtar Z. Khan F. A. Kim Y. ( 2019 ). KDD Cup 99 data sets: A perspective on the role of data sets in network intrusion detection research . Computer , 52 ( 2 ), 41 - 51 . Search in Google Scholar

Liu, Y., Wang, J., He, H., Huang, G., & Shi, W. (2021). Identifying important nodes affecting network security in complex networks. International Journal of Distributed Sensor Networks, 17(2), 1560-1571. Liu Y. Wang J. He H. Huang G. Shi W. ( 2021 ). Identifying important nodes affecting network security in complex networks . International Journal of Distributed Sensor Networks , 17 ( 2 ), 1560 - 1571 . Search in Google Scholar

Zhu, B., Chen, Y., & Cai, Y. (2019). Three kinds of network security situation awareness model based on big data. International Journal of Network Security, 21(1), 115-121. Zhu B. Chen Y. Cai Y. ( 2019 ). Three kinds of network security situation awareness model based on big data . International Journal of Network Security , 21 ( 1 ), 115 - 121 . Search in Google Scholar

Lin, P., & Chen, Y. (2019). Network security situation assessment based on text SimHash in big data environment. International Journal of Network Security, 21(4), 699-708. Lin P. Chen Y. ( 2019 ). Network security situation assessment based on text SimHash in big data environment . International Journal of Network Security , 21 ( 4 ), 699 - 708 . Search in Google Scholar

Sharma, A., & Sahay, S. K. (2019). Group-wise classification approach to improve Android malicious apps detection accuracy. International Journal of Network Security, 21(3), 409-417. Sharma A. Sahay S. K. ( 2019 ). Group-wise classification approach to improve Android malicious apps detection accuracy . International Journal of Network Security , 21 ( 3 ), 409 - 417 . Search in Google Scholar

Einy, S., Oz, C., & Navaei, Y. D. (2021). The anomaly- and signature-based IDS for network security using hybrid inference systems. Mathematical Problems in Engineering, 2021(9), 1-10. Einy S. Oz C. Navaei Y. D. ( 2021 ). The anomaly- and signature-based IDS for network security using hybrid inference systems . Mathematical Problems in Engineering , 2021 ( 9 ), 1 - 10 . Search in Google Scholar

Yao, S., Li, Z., Guan, J., & Liu, Y. (2020). Stochastic cost minimization mechanism based on identifier network for IoT security. IEEE Internet of Things Journal, 7(5), 3923-3934. Yao S. Li Z. Guan J. Liu Y. ( 2020 ). Stochastic cost minimization mechanism based on identifier network for IoT security . IEEE Internet of Things Journal , 7 ( 5 ), 3923 - 3934 . Search in Google Scholar

Martini, B., Mori, P., Marino, F., Saracino, A., & Castoldi, P. (2020). Pushing forward security in network slicing by leveraging continuous usage control. IEEE Communications Magazine, 58(7), 65-71. Martini B. Mori P. Marino F. Saracino A. Castoldi P. ( 2020 ). Pushing forward security in network slicing by leveraging continuous usage control . IEEE Communications Magazine , 58 ( 7 ), 65 - 71 . Search in Google Scholar

Liu, Q., & Zeng, M. (2020). Network security situation detection of Internet of Things for smart city based on fuzzy neural network. International Journal of Reasoning-Based Intelligent Systems, 12(3), 222. Liu Q. Zeng M. ( 2020 ). Network security situation detection of Internet of Things for smart city based on fuzzy neural network . International Journal of Reasoning-Based Intelligent Systems , 12 ( 3 ), 222 . Search in Google Scholar

Huang, J., Huang, W., Meng, Z., Miao, F., & Xiong, Y. (2020). Static analysis of superfluous network transmissions in Android applications. International Journal of Network Security, 22(3), 411-420. Huang J. Huang W. Meng Z. Miao F. Xiong Y. ( 2020 ). Static analysis of superfluous network transmissions in Android applications . International Journal of Network Security , 22 ( 3 ), 411 - 420 . Search in Google Scholar

Language:
English