Otwarty dostęp

Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment

   | 31 sty 2024

Zacytuj

Zhou, W., Zhang, H., & Li, Q. M. (2017). A network risk assessment method based on attack-defense graph model. Journal of Computers (Taiwan), 28(2), 105-118. Search in Google Scholar

Onawola, H. J., Aliyu, G., Badamasi, B., & Longe, O. B. (2021). A conceptual model for mitigating security vulnerabilities in iot-based smart grid electric energy distribution systems. International Journal of Engineering Research in Africa, 55, 122-131. Search in Google Scholar

Biswas, & Kumar, A. (2017). Source authentication techniques for network-on-chip router configuration packets. Acm Journal on Emerging Technologies in Computing Systems, 13(2), 1-31. Search in Google Scholar

Weiwei, W. U., Su, H. U., Lin, D., & Gang, W. U. (2022). Reliable resource allocation with rf fingerprinting authentication in secure iot networks. Science China Information Sciences, 65(7), 1-16. Search in Google Scholar

Gu, H., Zhang, J., Liu, T., Hu, M., Zhou, J., & Wei, T., et al. (2020). Diava: a traffic-based framework for detection of sql injection attacks and vulnerability analysis of leaked data. IEEE Transactions on Reliability(1), 69. Search in Google Scholar

Lee, S., Kim, S., Choi, K., & Shon, T. (2017). Game theory-based security vulnerability quantification for social internet of things. Future Generation Computer Systems, 82(MAY), 752-760. Search in Google Scholar

Singh, U. K., & Joshi, C. (2018). Scalable approach towards discovery of unknown vulnerabilities. International Journal of Network Security, 20(5). Search in Google Scholar

Lim, M. (2020). Avoiding the most common vulnerability-management pitfalls. Network Security, 2020(7), 12-14. Search in Google Scholar

Tian, Y., & Lu, Z. (2017). Novel permutation-diffusion image encryption algorithm with chaotic dynamic s-box and dna sequence operation. AIP Advances, 7(8), 085008. Search in Google Scholar

Qi, H. (2017). Model of computer network topology optimization based on pattern recognition technology. International Journal of Technology, Management. Search in Google Scholar

Kuilin, C., Xi, F., Yingchun, F., Liang, L., & Xiaoke, T. (2020). Design and implementation of system-on-chip for peripheral component interconnect express encryption card based on multiple algorithms. Circuit World, ahead-of-print(ahead-of-print). Search in Google Scholar

Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568. Search in Google Scholar

Chen, Z., Zuo, X., Dong, N., & Hou, B. (2019). Application of network security penetration technology in power internet of things security vulnerability detection. Transactions on Emerging Telecommunications Technologies(2). Search in Google Scholar

Zhang, J. (2019). Detection of network protection security vulnerability intrusion based on data mining. International Journal of Network Security, 21(6), 979-984. Search in Google Scholar

Amin, A., Eldessouki, A., Magdy, M. T., Abdeen, N., & Hegazy, I. (2019). Androshield: automated android applications vulnerability detection, a hybrid static and dynamic analysis approach. Information (Switzerland), 10(10). Search in Google Scholar

Jia, H. (2021). A context-aware neural embedding for function-level vulnerability detection. Algorithms, 14. Search in Google Scholar

Nuno Antunes, & Marco Vieira. (2017). Designing vulnerability testing tools for web services: approach, components, and tools. International Journal of Information Security. Search in Google Scholar

Li, R. Q. (2022). Research on key security detection method of cross domain information sharing based on pkg trust gateway. Journal of Interconnection Networks, 22(Supp01). Search in Google Scholar

Dankwa, S., & Yang, L. (2021). An efficient and accurate depth-wise separable convolutional neural network for cybersecurity vulnerability assessment based on captcha breaking. Electronics, 10(4), 480. Search in Google Scholar

Alsabeh, A., Khoury, J., Kfoury, E., Crichigno, J., & Bou-Harb, E. (2022). A survey on security applications of p4 programmable switches and a stride-based vulnerability assessment. Computer Networks, 207, 108800-. Search in Google Scholar

Li, J. (2017). Research on the application of data encryption technology in network security transmission. Revista De La Facultad De Ingenieria, 32(5), 595-604.2 Search in Google Scholar

Ma, Z., Wang, J., Gai, K., Duan, P., Zhang, Y., & Luo, S. (2023). Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network. Journal of systems architecture. Search in Google Scholar

Alshamrani, S. S. B. A. F. (2021). Iot data security with dna-genetic algorithm using blockchain technology. International Journal of Computer Applications in Technology, 65(2). Search in Google Scholar

A, J. W., A, K. H., A, S. F., A, Y. Z., A, H. T., & B, G. J., et al. (2020). A logistic mapping-based encryption scheme for wireless body area networks. Future Generation Computer Systems, 110, 57-67. Search in Google Scholar

A, F. H., B, M. W. A., A, S. T., B, G. A., & C, Z. H. A. (2021). A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Computer Networks. Search in Google Scholar

Goel, A., Sharma, D. K., & Gupta, K. D. (2021). Leobat: lightweight encryption and otp based authentication technique for securing iot networks. Expert Systems. Search in Google Scholar

Madni, H. A., Umer, R. M., & Foresti, G. L. (2023). Swarm-fhe: fully homomorphic encryption-based swarm learning for malicious clients. International Journal of Neural Systems, 33(08). Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics