Acceso abierto

Application of anti-mapping security access technology in network security protection


Cite

Zhang, X., Xu, G., & Zhu, J. (2021). Joint latent space models for network data with high-dimensional node variables. Biometrika. Search in Google Scholar

Zhu, H., Guo, Y., & Li, Y. (2017). Campus surveying control network construction based on gps. Boletin Tecnico/Technical Bulletin, 55(13), 579–586. Search in Google Scholar

Hua, H., Liu, Y., Wang, Y., Chang, D., & Leng, Q. (2018). Visual cryptography based multilevel protection scheme for visualization of network security situation. Procedia Computer Science, 131, 204–212. Search in Google Scholar

Sun, W., Wang, L., Wang, P., & Zhang, Y. (2020). Collaborative blockchain for space-air-ground integrated networks. IEEE Wireless Communications, 27(6), 82–89. Search in Google Scholar

Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341–350. Search in Google Scholar

Yi, Z., Du, X., Liao, Y., & Cao, L. (2017). A quality-of-service-aware dynamic evolution model for space–ground integrated network. International Journal of Distributed Sensor Networks, 13(8), 155014771772864. Search in Google Scholar

Tong, X., Liu, J., Wang, Z., Zhang, M., & Ma, J. (2021). Threshold‐based key management scheme for space network. International Journal of Communication Systems(10). Search in Google Scholar

Zhang, J., Zheng, J., Zhang, Z., Chen, T., Tan, Y. A., & Zhang, Q., et al. (2024). Attack-based advanced persistent threat attacks risk propagation assessment model for zero trust networks. Computer Networks, 245. Search in Google Scholar

Galyaev, V., Zykova, E., Repin, D., & Bokov, D. (2019). Recent trends in development of ddos attacks and protection systems against them. International Journal of Network Security, 21(4), 635–647. Search in Google Scholar

Ju, W., Chen, Y., Chen, L., & Li, B. (2024). Locating influence sources in social network by senders and receivers spaces mapping. Expert Systems With Applications, 248. Search in Google Scholar

Xing, Y., Shu, H., & Kang, F. (2023). Peerremove: an adaptive node removal strategy for p2p botnet based on deep reinforcement learning. Computers & Security. Search in Google Scholar

Yang, X. N., Wang, W., Xu, X. F., Pang, G. R., & Zhang, C. L. (2018). Research on the construction of a novel cyberspace security ecosystem. Engineering, 4(001), 47–52. Search in Google Scholar

Chundong, G., Qiquan, G., Dong, J., Zhenbo, W., Chuanglin, F., & Mengmeng, H., et al. (2019). The theoretical basis and technical path of cyberspace geography. Acta Geographica Sinica. Search in Google Scholar

Sun, Y., Lu, Y., Bao, J., & Tao, F. (2023). Prognostics and health management via long short-term digital twins. Journal of Manufacturing Systems. Search in Google Scholar

Kousar, R., Alhaisoni, M., Akhtar, S. A., Shah, N., & Karim, A. (2020). A secure data dissemination in a dht-based routing paradigm for wireless ad hoc network. Wireless Communications and Mobile Computing, 2020, 1–32. Search in Google Scholar

Wang, J., Song, Y., Jiang, H., Dong, K., & Liu, Y. (2023). Prototype development of multi-target tracking system for space multi-node laser communication network. Optik, 274, 170552-. Search in Google Scholar

D’Angelo, S., Marco Alfò, & Murphy, T. B. (2020). Modelling node heterogeneity in latent space models for multidimensional networks: modelling heterogeneity in multiplex data. Statistica Neerlandica (2). Search in Google Scholar

Shang, Y., & Zhang, J. (2021). Computer multimedia security protection system based on the network security active defense model. Advances in multimedia. Search in Google Scholar

Zhang, J. (2019). Detection of network protection security vulnerability intrusion based on data mining. International Journal of Network Security, 21(6), 979–984. Search in Google Scholar

Sangeeta Gupta, Premkumar Chithaluru, MayEl Barachi & Manoj Kumar. (2023). Secure data access using blockchain technology through IoT cloud and fabric environment. Security and Privacy (2), Search in Google Scholar

Yang Dakai, Liang Qiuhong, Li Runmei, Wang Jian & Cai Bai Gen. (2024). LSTM deep learning long-term traffic volume prediction model based on Markov state description. Journal of the Chinese Institute of Engineers (4), 405–413. Search in Google Scholar

Yu Yunhao. (2024). A network security situation assessment method based on fusion model. Discover Applied Sciences (3), Search in Google Scholar

Yongsheng Deng. (2024). Design of Industrial IoT Intrusion Security Detection System Based on LightGBM Feature Algorithm and Multi-layer Perception Network. Journal of Cyber Security and Mobility (2), 327–348. Search in Google Scholar

eISSN:
2444-8656
Idioma:
Inglés
Calendario de la edición:
Volume Open
Temas de la revista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics