Accès libre

Computer Security Active Defense Technology Based on Bayesian Model

À propos de cet article

Citez

Alexander, R. (2020). Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures. Journal of Information Security, 11(3), 121-137. Search in Google Scholar

Hu, H., Liu, J., Tan, J., & Liu, J. (2020). SOCMTD: selecting optimal countermeasure for moving target defense using dynamic game. KSII Transactions on Internet and Information Systems (TIIS), 14(10), 4157-4175. Search in Google Scholar

Khakzad, N. (2021). A Tutorial on Fire Domino Effect Modeling Using Bayesian Networks. Modelling, 2(2), 240-258. Search in Google Scholar

Zheng, Y., Hu, X., & Sun, H. (2021). Research on Motion Control for a Mobile Robot Using Learning Control Method. Applied Mathematics and Nonlinear Sciences, 6(1), 227-234. Search in Google Scholar

Rajesh Kanna, M., Pradeep Kumar, R., Nandappa, S., & Cangul, I. (2020). On Solutions of Fractional order Telegraph Partial Differential Equation by Crank-Nicholson Finite Difference Method. Applied Mathematics and Nonlinear Sciences, 5(2), 85-98. Search in Google Scholar

Wang, X., Bryan, C., Li, Y., Pan, R., Liu, Y., Chen, W., & Ma, K. L. (2020). Umbra: a visual analysis approach for defense construction against inference attacks on sensitive information. IEEE Transactions on Visualization and Computer Graphics, 28(7), 2776-2790. Search in Google Scholar

Mitchell, E. G., Whittle, R. J., & Griffiths, H. J. (2020). Benthic ecosystem cascade effects in Antarctica using Bayesian network inference. Communications Biology, 3(1), 1-7. Search in Google Scholar

Wu, W., & Yang, C. Y. (2022). An Overview on Network Security Situation Awareness in Internet. International Journal of Network Security, 24(3), 450-456. Search in Google Scholar

Zhu, M., Anwar, A. H., Wan, Z., Cho, J. H., Kamhoua, C. A., & Singh, M. P. (2021). A survey of defensive deception: Approaches using game theory and machine learning. IEEE Communications Surveys & Tutorials, 23(4), 2460-2493. Search in Google Scholar

Zhao, F., Zhang, H., Peng, J., Zhuang, X., & Na, S. G. (2020). A semi-self-taught network intrusion detection system. Neural Computing and Applications, 32(23), 17169-17179. Search in Google Scholar

Khowaja, S. A., & Khuwaja, P. (2021). Q-learning and LSTM based deep active learning strategy for malware defense in industrial IoT applications. Multimedia Tools and Applications, 80(10), 14637-14663. Search in Google Scholar

eISSN:
2444-8656
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics