1. bookAHEAD OF PRINT
Journal Details
License
Format
Journal
eISSN
2444-8656
First Published
01 Jan 2016
Publication timeframe
2 times per year
Languages
English
Open Access

Research on computer network security protection technology based on a superiority algorithm

Published Online: 08 May 2023
Volume & Issue: AHEAD OF PRINT
Page range: -
Received: 08 May 2022
Accepted: 28 Oct 2022
Journal Details
License
Format
Journal
eISSN
2444-8656
First Published
01 Jan 2016
Publication timeframe
2 times per year
Languages
English

Wang, C., Yu, L., Chang, H., et al. (2020). Application ]Research of File Fingerprint Identification Detection Based on a Network Security Protection System. Wireless Communications and Mobile Computing, 2020, 1-14. Search in Google Scholar

Shen, G., Wang, W., Mu, Q., et al. (2020). Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security. Wireless Communications and Mobile Computing. Search in Google Scholar

Zheng, G., Gong, B., & Zhang, Y. (2021). Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks. Wireless Communications and Mobile Computing. Search in Google Scholar

Ren, Y., Leng, Y., Zhu, F., et al. (2019). Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network. Sensors, 19(10), 2395-. Search in Google Scholar

Ottenburger, S. S., Akmak, H. K., Jakob, W., et al. (2020). A Novel Optimization Method for Urban Resilient and Fair Power Distribution Preventing Critical Network States. International Journal of Critical Infrastructure Protection, 29, 100354. Search in Google Scholar

Ceccarelli, D., Pithewan, K., Belotti, S., et al. (2015). Requirements for Abstraction and Control of Transport Networks. Chinese Physics Letters, 13(2), 149-152. Search in Google Scholar

Dong, C., & Zhao, L. (2019). Sensor network security defense strategy based on attack graph and improved binary PSO. Safety Science, 117, 81-87. Search in Google Scholar

Degefa, F. B., Lee, D., Kim, J., et al. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94(jan.15), 145-163. Search in Google Scholar

Ni, Z., Li, Q., & Liu, G. (2018). Game-Model-Based Network Security Risk Control. Computer, 51(4), 28-38. Search in Google Scholar

Weiming, T., Jixing, H., Yong, Z., et al. (2018). A Protection Method Based on Message Identification and Flow Monitoring for Managing the Congestion Arising From Network Attacks on Smart Substation. IEEE Communications Letters. Search in Google Scholar

Ding, K., Liu, Y., Cho, H. H., Zhang, X., & Wu, Z. (2016). Cooperative detection and protection for Interest flooding attacks in named data networking. International Journal of Communication Systems, 29(13), 1968-1980. Search in Google Scholar

Xu, L., Chen, L., Gao, Z., Wang, Z., & Xiong, N. (2020). DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Network, 34(1), 38-46. Search in Google Scholar

Zarca, A. M., Bernabe, J. B., Farris, I., & Marín, J. L. (2017). Enhancing IoT security through network softwarization and virtual security appliances. International Journal of Network Management. Search in Google Scholar

Liang, G., Weller, S. R., Luo, F., & Wang, Y. (2019). Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks. IEEE Transactions on Smart Grid, 10(3), 3162-3173. Search in Google Scholar

Liu, Y., & Morgan, Y. (2018). Security against Passive Attacks on Network Coding System - A Survey. Computer Networks, 138(June 19), 57-76. Search in Google Scholar

Ghaleb, A., Zhioua, S., & Almulhem, A. (2018). On PLC network security. International Journal of Critical Infrastructure Protection, 22(September), 62-69. Search in Google Scholar

Xu, L., Chen, L., Gao, Z., Wang, Z., & Xiong, N. (2020). DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Network, 34(1), 38-46. Search in Google Scholar

Gawande, P., & Dambhare, S. (2019). A new Predictive Analytic aided Response-Based System Integrity Protection Scheme. IET Generation Transmission & Distribution, 13(8). Search in Google Scholar

Yw, A., Hh, B., Nw, B., & Qa, H. (2020). An incentive-based protection and recovery strategy for secure big data in social networks. Information Sciences, 508, 79-91. Search in Google Scholar

Ni, Z., Li, Q., & Liu, G. (2018). Game-Model-Based Network Security Risk Control. Computer, 51(4), 28-38. Search in Google Scholar

Guo, J. C., Fan, D., Che, H. Y., et al. (2015). An approach to network security evaluation of computer network information system with triangular fuzzy information. Journal of Intelligent & Fuzzy Systems, 28(5), 2029-2035. Search in Google Scholar

Mason, D. (2015). Computer Network Security and Cyber Ethics, 4th edition. Online Information Review. Search in Google Scholar

Wang, J. (2021). Full‐scene network security protection system based on ubiquitous power Internet of things. International Journal of Communication Systems. Search in Google Scholar

Genge, B., Graur, F., & Haller, P. (2015). Experimental assessment of network design approaches for protecting industrial control systems. International Journal of Critical Infrastructure Protection, 11(DEC.), 24-38. Search in Google Scholar

Busquim, E., Piqueira, J., Cruz, J. J., et al. (2021). Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants. International journal on critical infrastructure protection, 34(SEP.). Search in Google Scholar

Wurzenberger, M., Skopik, F., Settanni, G., et al. (2016). Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools. Information Systems. Search in Google Scholar

Zhang, Y., Li, et al. (2015). INFORMATION MANAGEMENT AND SECURITY STRATEGY OF HOSPITAL COMPUTER NETWORK. Basic & clinical pharmacology & toxicology. Search in Google Scholar

Recommended articles from Trend MD