This work is licensed under the Creative Commons Attribution 4.0 International License.
Wolf, W., White, G. B., Fisch, E. A., Crago, S. P., Pooch, U. W., McMahon, J. O., ... & Lebak, J. M. (2017). Computer system and network security. CRC press.Search in Google Scholar
Zeng, H., Liu, Z., & Cai, H. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing.Search in Google Scholar
Lu, Z., Qu, G., & Liu, Z. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), 760-776.Search in Google Scholar
Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors, 22(13), 4730.Search in Google Scholar
Lin, H., Yan, Z., Chen, Y., & Zhang, L. (2018). A survey on network security-related data collection technologies. IEEE Access, 6, 18345-18365.Search in Google Scholar
Ouda, A. J., Yousif, A. N., Hasan, A. S., Ibrahim, H. M., & Shyaa, M. A. (2022). The impact of cloud computing on network security and the risk for organization behaviors. Webology, 19(1), 195-206.Search in Google Scholar
Tang, Y., & Elhoseny, M. (2019). Computer network security evaluation simulation model based on neural network. Journal of Intelligent & Fuzzy Systems, 37(3), 3197-3204.Search in Google Scholar
Vanerio, J., & Casas, P. (2017, August). Ensemble-learning approaches for network security and anomaly detection. In Proceedings of the workshop on big data analytics and machine learning for data communication networks (pp. 1-6).Search in Google Scholar
Saxena, N., Grijalva, S., Chukwuka, V., & Vasilakos, A. V. (2017). Network security and privacy challenges in smart vehicle-to-grid. IEEE Wireless Communications, 24(4), 88-98.Search in Google Scholar
Dolan, E., & Widayanti, R. (2022). Implementation of authentication systems on hotspot network users to improve computer network security. International Journal of Cyber and IT Service Management, 2(1), 88-94.Search in Google Scholar
Sagduyu, Y. E., Shi, Y., & Erpek, T. (2019, June). IoT network security from the perspective of adversarial deep learning. In 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (pp. 1-9). IEEE.Search in Google Scholar
Li, Y., Huang, G. Q., Wang, C. Z., & Li, Y. C. (2019). Analysis framework of network security situational awareness and comparison of implementation methods. EURASIP Journal on Wireless Communications and Networking, 2019, 1-32.Search in Google Scholar
Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177.Search in Google Scholar
Dadheech, K., Choudhary, A., & Bhatia, G. (2018, April). De-militarized zone: A next level to network security. In 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) (pp. 595-600). IEEE.Search in Google Scholar
Waqas, M., Tu, S., Halim, Z., Rehman, S. U., Abbas, G., & Abbas, Z. H. (2022). The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artificial Intelligence Review, 55(7), 5215-5261.Search in Google Scholar
Ren, J. (2020). Construction of Personnel Training System Under School-Enterprise Joint Training Mode–Taking Personnel Training of “Network Space Security Major” as an Example. In Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 2 (pp. 145-152). Springer International Publishing.Search in Google Scholar
He, W., & Zhang, Z. (2019). Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), 249-257.Search in Google Scholar
Reimers, K., & Andersson, D. (2017). Post-secondary education network security: the end user challenge and evolving threats. In ICERI2017 Proceedings (pp. 1787-1796). IATED.Search in Google Scholar
Naagas, M. A., & Palaoag, T. D. (2018, February). A threat-driven approach to modeling a campus network security. In Proceedings of the 6th International Conference on Communications and Broadband Networking (pp. 6-12).Search in Google Scholar
Prabawa, H. W., Junaeti, E., & Permana, Y. (2017, October). Using capture the flag in classroom: Game-based implementation in network security learning. In 2017 3rd International Conference on Science in Information Technology (ICSITech) (pp. 690-695). IEEE.Search in Google Scholar
Kislyakov, P., & Shmeleva, E. (2018). Media education in training students to provide information and psychological security. Медиаобразование, (1), 107-116.Search in Google Scholar
Rathore, S., Sharma, P. K., Loia, V., Jeong, Y. S., & Park, J. H. (2017). Social network security: Issues, challenges, threats, and solutions. Information sciences, 421, 43-69.Search in Google Scholar
Pereira, T., Barreto, L., & Amaral, A. (2017). Network and information security challenges within Industry 4.0 paradigm. Procedia manufacturing, 13, 1253-1260.Search in Google Scholar
Huiju Yi, Shengcai Zhang, Dezhi An & Zhenyu Liu.(2024).PatchesNet: PatchTST-based multi-scale network security situation prediction.Knowledge-Based Systems112037-.Search in Google Scholar
Bingying Shi.(2024).On the Organic Integration of College Students’ Mental Health Education and Curriculum Ideology and Politics.Region - Educational Research and Reviews(4).Search in Google Scholar
Amir Hussain,Kifayat Ullah,Tapan Senapati & Sarbast Moslem.(2024).Energy supplier selection by TOPSIS method based on multi-attribute decision-making by using novel idea of complex fuzzy rough information.Energy Strategy Reviews101442-.Search in Google Scholar
Jixin Zhang,Shihao Zhang,Jianyu Qiao,Jiahui Wei,Lan Wang,Zhonghao Li & Jincan Zhuo.(2024).Safety resilience evaluation of hydrogen refueling stations based on improved TOPSIS approach.International Journal of Hydrogen Energy396-405.Search in Google Scholar