Otwarty dostęp

Research on Network Security Analysis and Prevention Strategies Based on Artificial Intelligence Algorithms


Zacytuj

Li, Y., Hua, N., Li, J., Zhong, Z., & Zheng, X. (2019). Optical spectrum feature analysis and recognition for optical network security with machine learning. Optics Express, 27(17), 24808. Search in Google Scholar

Hartzell, S., Stubel, C., & Bonaci, T. (2020). Security analysis of an automobile controller area network bus. IEEE Potentials, 39(3), 19-24. Search in Google Scholar

Huang, J., Huang, W., Meng, Z., Miao, F., & Xiong, Y. (2020). Static analysis of superfluous network transmissions in android applications. International Journal of Network Security, 22(3), 411-420. Search in Google Scholar

Xiao, B., Lan, Y., Zhao, H., Wu, X., & Liu, W. (2022). An ism-based analysis method on the influencing factors of network security situation (nss). Journal of Interconnection Networks. Search in Google Scholar

Sureshkumar, T., Lingaraj, M., Anand, B., & Premkumar, T. (2018). Non‐dominated sorting particle swarm optimization (nspso) and network security policy enforcement for policy space analysis. International Journal of Communication Systems, 31(10), e3554.1-e3554.15. Search in Google Scholar

Ijaz, S., Hashmi, F. A., Asghar, S., & Alam, M. M. (2018). Vector based genetic algorithm to optimize predictive analysis in network security. Applied Intelligence, 48(5), 1086-1096. Search in Google Scholar

Yang, W. H. (2020). Security detection of network intrusion: application of cluster analysis method. Computer Optics, 44(4), 660-664. Search in Google Scholar

Liu, Lin, Xinbao, Pei, Jun, & Pardalos, et al. (2017). A game-theoretic analysis of information security investment for multiple firms in a network. The Journal of the Operational Research Society. Search in Google Scholar

Atallah, M., & Kaddoum, G. (2019). Secrecy analysis in wireless network with passive eavesdroppers by using partial cooperation. IEEE Transactions on Vehicular Technology, 1-1. Search in Google Scholar

Fengying, M. A., Yin, Y., & Chen, W. (2019). Reliability analysis of power and communication network in drone monitoring system. IEICE Transactions on Communications, E102.B(10). Search in Google Scholar

Sharma, A., & Sahay, S. K. (2019). Group-wise classification approach to improve android malicious apps detection accuracy. International Journal of Network Security, 21(3), 409-417. Search in Google Scholar

Wei Wang, Wen-Bo Du, Wei-Han Li, Lu Carol Tong, & and Jiao-E Wang (2021). Network analysis and spatial agglomeration of china’s high-speed rail: a dual network approach. Chinese Physics B, 30(1), 18901-null. Search in Google Scholar

Envelope, G. D. A., A, F. L., & A, G. W. (2022). A website’s network attack analysis and security countermeasures. Procedia Computer Science, 208, 577-582. Search in Google Scholar

Liu, K., Shen, W., Cheng, Y., Cai, L. X., & Niu, Z. (2018). Security analysis of mobile device-to-device network applications. IEEE Internet of Things Journal, PP(99), 1-1. Search in Google Scholar

Qian, X., Liu, X., Pei, J., Pardalos, P. M., & Liu, L. (2017). A game-theoretic analysis of information security investment for multiple firms in a network. Journal of the Operational Research Society. Search in Google Scholar

A, C. T., & B, X. H. (2020). Mathematical modeling of security impact analysis of communication network based on monte carlo algorithm - sciencedirect. Computer Communications, 157, 20-27. Search in Google Scholar

Dang-Pham, D., & Nkhoma, M. (2017). Effects of team collaboration on sharing information security advice: insights from network analysis. Information Resources Management Journal, 30(3), 58-72. Search in Google Scholar

Shi, K. L. (2017). Research on the network information security evaluation model and algorithm based on grey relational clustering analysis. Revista de la Facultad de Ingenieria, 14(1), 69-73. Search in Google Scholar

Qu, Q., Liu, C., & Bao, X. (2021). Financial security analysis of e-commerce platform based on supply chain for heterogeneous network location verification. Journal of Sensors. Search in Google Scholar

Shin, J., You, I., & Seo, J. T. (2020). Investment priority analysis of ics information security resources in smart mobile iot network environment using the analytic hierarchy process. Mobile Information Systems, 2020(3), 1-11. Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics