Otwarty dostęp

Research on Network Security Situation Assessment Model in Decentralized Computing Environment

   | 16 gru 2023

Zacytuj

Shailendra, Rathore, Pradip, Kumar, Sharma, & Vincenzo, et al. (2017). Social network security: issues, challenges, threats, and solutions. Information Sciences. Search in Google Scholar

Wei, L. M. (2020). Network security situation prediction based on combining 3d-cnns and bi-grus. International Journal of Performability Engineering, 16(12). Search in Google Scholar

Lv, G., Xiao, R., Feng, Y., & Meng, F. (2017). Data security strategy and key technologies in cloud computing environment. Revista de la Facultad de Ingenieria, 32(13), 539-544. Search in Google Scholar

Liu, X., Sun, X., & Huang, G. (2019). An emerging decentralized services computing paradigm for big data governance: a position paper. IEEE Transactions on Services Computing, PP(99), 1-1. Search in Google Scholar

Rawajbeh, M. R. A. (2019). Performance evaluation of a computer network in a cloud computing environment. ICIC Express Letters, 13(8), 719-727. Search in Google Scholar

Liao, Y., Zhao, G., Wang, J., & Li, S. (2020). Network security situation assessment model based on extended hidden markov. Mathematical Problems in Engineering, 2020. Search in Google Scholar

Wang, H., Zhao, D., & Li, X. (2020). Research on network security situation assessment and forecasting technology. Journal of web engineering(7/8), 19. Search in Google Scholar

Yang, S., Yin, D., Song, X., Dong, X., Manogaran, G., & Mastorakis, G., et al. (2019). Security situation assessment for massive mimo systems for 5g communications. Future Generation Computer Systems, 98, 25-34. Search in Google Scholar

Rongrong, X., Xiaochun, Y., & Zhiyu, H. (2019). Framework for risk assessment in cyber situational awareness. IET Information Security. Search in Google Scholar

Oppliger, R., Pernul, G., & Katsikas, S. (2017). New frontiers: assessing and managing security risks. Computer, 50(4), 48-51. Search in Google Scholar

Ren, J. (2020). Network security situation assessment model based on information quality control. International Journal of Performability Engineering, 16(4), 673. Search in Google Scholar

Tao, X., Kong, K., Zhao, F., Cheng, S., & Wang, S. (2020). An efficient method for network security situation assessment. International Journal of Distributed Sensor Networks, 16(11), 155014772097151. Search in Google Scholar

Qiao, X. (2017). Study on the computer network security evaluation based on gabp algorithm. Boletin Tecnico/Technical Bulletin, 55(18), 497-504. Search in Google Scholar

Zhu, Y., & Du, Z. (2021). Research on the key technologies of network security-oriented situation prediction. Scientific Programming. Search in Google Scholar

Hang, F., Xie, L., Guo, W., Lv, Y., Ou, W., & Shanthini, A. (2021). Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception. International journal of high performance systems architecture(3/4), 10. Search in Google Scholar

He, W., Qiao, P., & Xing, L. (2017). Research on multidimensional and evolutionary network security model in cloud computing environment. C e Ca, 42(6), 2563-2571. Search in Google Scholar

Zhang, H., Kang, K., & Bai, W. (2023). Hierarchical network security situation awareness data fusion method in cloud computing environment. Journal of computational methods in sciences and engineering. Search in Google Scholar

Sheron, P. S. F., Sridhar, K. P., Baskar, S., & Shakeel, P. M. (2019). A decentralized scalable security framework for end-to-end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies(5). Search in Google Scholar

Yuan, B., Liu, L., & Antonopoulos, N. (2017). Efficient service discovery in decentralized online social networks. Future Generation Computer Systems, S0167739X17306465. Search in Google Scholar

Liu, J., & Fan, W. (2021). Research on security situation assessment algorithm under virtual technology of cloud platform. MATEC Web of Conferences, 336(1), 08004. Search in Google Scholar

Zhao, Z., Peng, Y., Huang, J., Zhou, T., & Wang, H. (2020). An evaluation method of network security situation using data fusion theory. International Journal of Performability Engineering(7), 16. Search in Google Scholar

Long, J. S. X. (2021). Anonymous chaotic-based identity authentication protocol in iot. International Journal of Embedded Systems, 14(2). Search in Google Scholar

Peng, Y., & Limin, Z. (2017). Hierarchical protection mechanism of network information based on computer security model algorithm terminal. Acta Technica CSAV (Ceskoslovensk Akademie Ved), 62(2), 341-350. Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics