Uneingeschränkter Zugang

Design and implementation of computer network security protection system based on artificial intelligence technology

   | 28. Apr. 2023

Zitieren

Sujan Ghimire, Ravinesh C. Deo, Nawin Raj, Jianchun Mi. (2019). Deep solar radiation forecasting with convolutional neural network and long short-term memory network algorithms. Applied Energy, 253. Search in Google Scholar

Yuantao Yao, Jin Wang, Pengcheng Long, Min Xie, Jianye Wang. (2020). Small‐batch‐size convolutional neural network based fault diagnosis system for nuclear energy production safety with big‐data environment. International Journal of Energy Research, 44(7). Search in Google Scholar

Iman Sharafaldin, Arash Habibi Lashkari, Ali A. (2019). Ghorbani. An evaluation framework for network security visualizations. Computers & Security, 84. Search in Google Scholar

Madhusanka Liyanage, Andrei Gurtov. (2014). Securing virtual private LAN service by efficient key management. Security and Communication Networks, 7(1). Search in Google Scholar

Lewis, J. A. (2010). Securing cyberspace for the 44th presidency. Search in Google Scholar

Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel,Muttukrishnan Rajarajan. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1). Search in Google Scholar

Li, W., Zhu, H. (2021). Research on Comprehensive Enterprise Network Security//2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC) 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 1-6. Search in Google Scholar

Sally, M. (2020). Elghamrawy. Security in Cognitive Radio Network: Defense against Primary User Emulation attacks using Genetic Artificial Bee Colony (GABC) algorithm. Future Generation Computer Systems, 109. Search in Google Scholar

Mazen Juma, Azza Abdel Monem, Khaled Shaalan. (2020). Hybrid End-to-End VPN Security Approach for Smart IoT Objects. Journal of Network and Computer Applications, 158. Search in Google Scholar

Khaleghi B., Khamis A., Karray F O., et al. (2013). Multisensor data fusion: A review of the state-of-theart. Information Fusion, 14(1), 28-44. Search in Google Scholar

Abdlhamed, M., Kifayat, K., Shi, Q., et al. (2017). Intrusion prediction systems//Information fusion for cyber-security analytics. Springer, Cham, 155-174. Search in Google Scholar

Dugad, R., Desai, U B. (2020). A tutorial on hidden Markov models. Proceedings of the IEEE: Applications in Speech Recognition, 77(2), 25-286. Search in Google Scholar

Murphy, C. (2014). Combining belief functions when evidence conflicts. Decision Support systems, 29(07), 1-9. Search in Google Scholar

Hernández, A., Sanchez, V., Sánchez, G., et al. (2016). Security attack prediction based on user sentiment analysis of Twitter data//2016 IEEE international conference on industrial technology (ICIT). IEEE, 610-617. Search in Google Scholar

Yager, R. R. (2019). Comparing approximate reasoning and proba⁃ bilistic reasoning using the Dempster-Shafer work. International Journal of Approximate Reasoning, 50(05), 812-821. Search in Google Scholar

Husák, M., Komárková, J., Bou-Harb, E., et al. (2018). Survey of attack projection, prediction, and forecasting in cyber security. IEEE Communications Surveys & Tutorials, 21(1), 640-660. Search in Google Scholar

Dutt, V., Ahn, Y. S., Gonzalez, C. (2013). Cyber Situation Awareness Modeling Detection of Cyber Attacks With Instance-Based Learning Theory. Human Factors: The Journal of the Human Factors and Ergonomics Society, 55(3), 605-618. Search in Google Scholar

Yi-Bing, L., Iian, K., Hong, X. (2017). The Algorithm Aiming at Conflict to Improve DS Evidencd Theory. Information Technology Journal, 10(09), 1779-1783. Search in Google Scholar

Shrivas, A. K., Dewangan, A. K., Shrivas, A. K., et al. (2014). An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set. 99(15), 8-13. Search in Google Scholar

Kasac, J., Deur, J., Novakovic, B., et al. (2019). A conjugate gradient-based BPTT-like optimal control algorithm. 2009 IEEE Multi-conference on Systems and Control, 861-866 Search in Google Scholar

Storn, R., Price, K. (2017). Differential evolutiona simple and efficient heuristic for global optimization over continuous spaces. Journal of Global Optimization, 11 (4), 341-359 Search in Google Scholar

Li, J., Shi, Y., Xue, Z. (2016). APT Detection based on DNS Traffic and Threat Intelligence. Information Security and Communications Privacy, 84-88. Search in Google Scholar

Bar, A., Shapira, B., Rokach, L., et al. (2016). Identifying attack propagation patterns in honeypots using Markov chains modeling and complex networks analysis//2016 IEEE international conference on software science, technology and engineering (SWSTE). IEEE, 28-36. Search in Google Scholar

Ali, O., Ishak, M. K., Bhatti, M. K. L., et al. (2022). A Comprehensive Review of Internet of Things: Technology Stack, Middlewares, and Fog/Edge Computing Interface. Sensors, 22(3), 995. Search in Google Scholar

Zittrain, J. (2008). Ubiquitous human computing. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 366 (1881), 3813-3821. Search in Google Scholar

Han Guangjie, He Yu, Jiang Jinfang, et al, (2019). A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks. IEEE Transactions on Vehicular Technology, 68(11), 11239-11247. Search in Google Scholar

Serpen, G., Aghaei, E. (2018). Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms. Intelligent Data Analysis, 22(5), 1101-1114. Search in Google Scholar

RB. Almeida, V. Covalski, R. Machado, et al. (2019). A hierarchical architectural model for network security exploring situational awareness. SAC ‘19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. 1365–1372 Search in Google Scholar

Jøsang, A., Bhuiyan, T. (2008). Optimal trust network analysis with subjective logic//2008 Second International Conference on Emerging Security Information, Systems and Technologies. IEEE, 179-184. Search in Google Scholar

Shrivas, A. K., Dewangan, A. K., Shrivas, A. K., et al. (2014). An Ensemble Model for Classification of Attacks with Feature Selection based on KDD99 and NSL-KDD Data Set, 99(15), 8-13. Search in Google Scholar

Polatidis, N., Pimenidis, E., Pavlidis, M., et al. (2017). Recommender systems meeting security: From product recommendation to cyber-attack prediction//International Conference on Engineering Applications of Neural Networks. Springer, Cham, 508-519. Search in Google Scholar

eISSN:
2444-8656
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
Volume Open
Fachgebiete der Zeitschrift:
Biologie, andere, Mathematik, Angewandte Mathematik, Allgemeines, Physik