Open Access

Research on the design of computer network security defense system applying cloud computing technology

   | Oct 21, 2023

Cite

Deng, Y. J., Li, Y. Q., Qin, Y. H., Dong, M. R., & Liu, B. (2020). Optimal defense resource allocation for attacks in wireless sensor networks based on risk assessment model. Chaos, Solitons & Fractals, 137. Search in Google Scholar

Ni, Z., Li, Q., & Liu, G. (2018). Game-model-based network security risk control. Computer, 51(4), 28-38. Search in Google Scholar

Jyothi, V., Addepalli, S. K., & Karri, R. (2018). Dpfee: a high performance scalable pre-processor for network security systems. IEEE Transactions on Multi-Scale Computing Systems, 1-1. Search in Google Scholar

Jiang, C. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6. Search in Google Scholar

Patil, H. K., & Chen, T. M. (2017). Wireless sensor network security: the internet of things - sciencedirect. Computer and Information Security Handbook (Third Edition), 317-337. Search in Google Scholar

Vajjha, H. V. V., & Sushma, P. (2021). Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 64(2), 1-8. Search in Google Scholar

Alejandro, M. Z., Jorge, B. B., Ivan, F., Yacine, K., Tarik, T., & Antonio, S. (2018). Enhancing iot security through network softwarization and virtual security appliances. International Journal of Network Management, 28, e2038-. Search in Google Scholar

Wang, Y., Ma, J., Sharma, A., Singh, P. K., Gaba, G. S., & Masud, M., et al. (2021). An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks. Journal of Sensors. Search in Google Scholar

Kang, Y., Zhong, J., Li, R., Liang, Y., & Zhang, N. (2021). Classification method for network security data based on multi-featured extraction. International Journal on Artificial Intelligence Tools. Search in Google Scholar

Guang, K., Shuo, W., & Guangming, T. (2019). Research on key technologies of network security situational awareness for attack tracking prediction. Chinese Journal of Electronics, 28(01), 166-175. Search in Google Scholar

Lorenz, C., Hock, D., Scherer, J., Durner, R., Kellerer, W., & Gebert, S., et al. (2017). An sdn/nfv-enabled enterprise network architecture offering fine-grained security policy enforcement. IEEE Communications Magazine, PP(3), 2-8. Search in Google Scholar

Li, Y., Hua, N., Yu, Y., Luo, Q. S., & Zheng, X. (2018). Light source and trail recognition via optical spectrum feature analysis for optical network security. IEEE Communications Letters, 1-1. Search in Google Scholar

Yang, X., Chen, P., Gao, S., & Niu, Q. (2018). Csi-based low-duty-cycle wireless multimedia sensor network for security monitoring. Electronics Letters, 54(5), 323-324. Search in Google Scholar

Sun, N., Li, T., Song, G., & Xia, H. (2021). Network security technology of intelligent information terminal based on mobile internet of things. Mobile Information Systems. Search in Google Scholar

Zhan, K. (2021). Design of computer network security defense system based on artificial intelligence and neural network. Journal of Intelligent and Fuzzy Systems, (9), 1-13. Search in Google Scholar

Enoch, S. Y., Moon, C. Y., Lee, D., Ahn, M. K., & Kim, D. S. (2022). A practical framework for cyber defense generation, enforcement and evaluation. Computer Networks, 208, 108878-. Search in Google Scholar

Ding, S., Zhang, Z., & Xie, J. (2020). Network security defense model based on firewall and ips. Journal of Intelligent and Fuzzy Systems, 39(12), 1-9. Search in Google Scholar

Dong, C., & Zhao, L. (2019). Sensor network security defense strategy based on attack graph and improved binary pso. Safety Science, 117, 81-87. Search in Google Scholar

eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics