This work is licensed under the Creative Commons Attribution 4.0 International License.
Shailendra, Rathore, Pradip, Kumar, Sharma, & Vincenzo, et al. (2017). Social network security: issues, challenges, threats, and solutions. Information Sciences.Search in Google Scholar
Wei, L. M. (2020). Network security situation prediction based on combining 3d-cnns and bi-grus. International Journal of Performability Engineering, 16(12).Search in Google Scholar
Lv, G., Xiao, R., Feng, Y., & Meng, F. (2017). Data security strategy and key technologies in cloud computing environment. Revista de la Facultad de Ingenieria, 32(13), 539-544.Search in Google Scholar
Liu, X., Sun, X., & Huang, G. (2019). An emerging decentralized services computing paradigm for big data governance: a position paper. IEEE Transactions on Services Computing, PP(99), 1-1.Search in Google Scholar
Rawajbeh, M. R. A. (2019). Performance evaluation of a computer network in a cloud computing environment. ICIC Express Letters, 13(8), 719-727.Search in Google Scholar
Liao, Y., Zhao, G., Wang, J., & Li, S. (2020). Network security situation assessment model based on extended hidden markov. Mathematical Problems in Engineering, 2020.Search in Google Scholar
Wang, H., Zhao, D., & Li, X. (2020). Research on network security situation assessment and forecasting technology. Journal of web engineering(7/8), 19.Search in Google Scholar
Yang, S., Yin, D., Song, X., Dong, X., Manogaran, G., & Mastorakis, G., et al. (2019). Security situation assessment for massive mimo systems for 5g communications. Future Generation Computer Systems, 98, 25-34.Search in Google Scholar
Rongrong, X., Xiaochun, Y., & Zhiyu, H. (2019). Framework for risk assessment in cyber situational awareness. IET Information Security.Search in Google Scholar
Oppliger, R., Pernul, G., & Katsikas, S. (2017). New frontiers: assessing and managing security risks. Computer, 50(4), 48-51.Search in Google Scholar
Ren, J. (2020). Network security situation assessment model based on information quality control. International Journal of Performability Engineering, 16(4), 673.Search in Google Scholar
Tao, X., Kong, K., Zhao, F., Cheng, S., & Wang, S. (2020). An efficient method for network security situation assessment. International Journal of Distributed Sensor Networks, 16(11), 155014772097151.Search in Google Scholar
Qiao, X. (2017). Study on the computer network security evaluation based on gabp algorithm. Boletin Tecnico/Technical Bulletin, 55(18), 497-504.Search in Google Scholar
Zhu, Y., & Du, Z. (2021). Research on the key technologies of network security-oriented situation prediction. Scientific Programming.Search in Google Scholar
Hang, F., Xie, L., Guo, W., Lv, Y., Ou, W., & Shanthini, A. (2021). Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception. International journal of high performance systems architecture(3/4), 10.Search in Google Scholar
He, W., Qiao, P., & Xing, L. (2017). Research on multidimensional and evolutionary network security model in cloud computing environment. C e Ca, 42(6), 2563-2571.Search in Google Scholar
Zhang, H., Kang, K., & Bai, W. (2023). Hierarchical network security situation awareness data fusion method in cloud computing environment. Journal of computational methods in sciences and engineering.Search in Google Scholar
Sheron, P. S. F., Sridhar, K. P., Baskar, S., & Shakeel, P. M. (2019). A decentralized scalable security framework for end-to-end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies(5).Search in Google Scholar
Yuan, B., Liu, L., & Antonopoulos, N. (2017). Efficient service discovery in decentralized online social networks. Future Generation Computer Systems, S0167739X17306465.Search in Google Scholar
Liu, J., & Fan, W. (2021). Research on security situation assessment algorithm under virtual technology of cloud platform. MATEC Web of Conferences, 336(1), 08004.Search in Google Scholar
Zhao, Z., Peng, Y., Huang, J., Zhou, T., & Wang, H. (2020). An evaluation method of network security situation using data fusion theory. International Journal of Performability Engineering(7), 16.Search in Google Scholar
Long, J. S. X. (2021). Anonymous chaotic-based identity authentication protocol in iot. International Journal of Embedded Systems, 14(2).Search in Google Scholar
Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341-350.Search in Google Scholar