Computer Science ›› 2021, Vol. 48 ›› Issue (6): 338-342.doi: 10.11896/jsjkx.201200239
• Information Security • Previous Articles Next Articles
WANG Jin-heng1, SHAN Zhi-long2, TAN Han-song3, WANG Yu-lin1
CLC Number:
[1]LIU J,SU P R.Review of software and network security [J].Acta Sinica Sinica,2018,29(1):42-68. [2]SONG J,TANG G L.Research and application of network security situation awareness technology [J].Communication Technology,2018(6):187-192. [3]XIE L X,WANG Z H.Network security situation assessment method based on cuckoo search Optimized BP neural network [J].Computer Applications,2017,37(7):1926-1930. [4]LIU H,LIU J H,HUI X Y.Network security situation assessment based on cloud model and Markov chain [J].Computer and Digital Engineering,2019(6):155-159. [5]YE L,TAN Z J.A network security situation assessment me-thod based on deep learning [J].Intelligent Computer and Application,2019,9(6):73-75. [6]HAN X L,LIU Y,ZHANG Z J,et al.Overview of network security situation awareness theory and technology and Research on difficult problems [J].Information Security and Communication Security,2019(7):61-71. [7]OLIMID R F.SecRet:How to Apply the 5E Model for a Master’s Level Network Security Course[J].IEEE Communications Magazine,2019,57(11):54-59. [8]FENG S,XIONG Z,NIYATO D,et al.Joint Traffic Routing and Virtualized Security Function Activation in Wireless Multihop Networks[J].IEEE Transactions on Vehicular Technology,2019,68(99):9205-9219. [9]LU Z,QU G,LIU Z.A Survey on Recent Advances in Vehicular Network Security,Trust,and Privacy[J].IEEE Transactions on Intelligent Transportation Systems,2019,20(2):760-776. [10]MAZURCZYK W,BISSON P,JOVER R P,et al.Challengesand Novel Solutions for 5G Network Security,Privacy and Trust[J].IEEE Wireless Communications,2020,27(4):6-7. [11]SEVINÇ E,COŞAR A.An Evolutionary Genetic Algorithm for Optimization of Distributed Database Queries[J].2018,54(5):717-725. [12]KANTOUR N,BOUROUBI S.Cryptanalysis of Merkle-Hell-man cipher using parallel genetic algorithm[J].Mobile Networks and Applications,2019(8):1-12. [13]JIA W,ZHAO D,ZHENG Y,et al.A novel optimized GA-Elman neural network algorithm[J].Neural Computing and Applications,2019,31(6):1-11. [14]QU X H,SHI X M.Research on network security situation assessment technology based on analytic hierarchy process [J].Automation Technology and Application,2018,37(11):43-45. [15]WU J T,QIAO Y F,ZHU S F,et al.Network security situation assessment and prediction method based on HMM [J].Navigation and Control,2018(2):13-20,34. [16]HUANG Z H.Heuristic network security situation prediction based on simplex vector machine [J].Journal of Hunan Institute of Engineering (Natural Science Edition),2020,30(1):53-56. [17]CAO J M.Research on Network Security Framework of Hyperheuristic SVM for Big Data [J].Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition),2020,32(1):23-29. [18]ZARCA A M,BERNABE J B,SKARMETA A,et al.VirtualIoT HoneyNets to mitigate cyberattacks in SDN/NFV-enabled IoT networks[J].IEEE Journal on Selected Areas in Communications,2020,38(99):1262-1277. [19]UBARHANDE S D,DOYE D D,NALWADE P S.A timestamp-based algorithm to improve security and performance of mobile ad hoc network[J].Wireless Networks,2019,25(4):1867-1874. [20]ZHU N,YAO S H,ZHENG X L.Analysis and Model Establishment for Mobile Communication Network Risk Evaluation Index System[J].Journal of Chongqing Technology and Business University(Natural Science Edition),2020,37(3):100-106. [21]LI X.A Real-time Prediction Method of Network Security Risk Based on Predictive Model [J].Journal of Chongqing University of Technology(Natural Science),2019,33(2):132-137. |
[1] | YANG Hao-xiong, GAO Jing, SHAO En-lu. Vehicle Routing Problem with Time Window of Takeaway Food ConsideringOne-order-multi-product Order Delivery [J]. Computer Science, 2022, 49(6A): 191-198. |
[2] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[3] | SHEN Biao, SHEN Li-wei, LI Yi. Dynamic Task Scheduling Method for Space Crowdsourcing [J]. Computer Science, 2022, 49(2): 231-240. |
[4] | WU Shan-jie, WANG Xin. Prediction of Tectonic Coal Thickness Based on AGA-DBSCAN Optimized RBF Neural Networks [J]. Computer Science, 2021, 48(7): 308-315. |
[5] | ZHENG Zeng-qian, WANG Kun, ZHAO Tao, JIANG Wei, MENG Li-min. Load Balancing Mechanism for Bandwidth and Time-delay Constrained Streaming Media Server Cluster [J]. Computer Science, 2021, 48(6): 261-267. |
[6] | ZUO Jian-kai, WU Jie-hong, CHEN Jia-tong, LIU Ze-yuan, LI Zhong-zhi. Study on Heterogeneous UAV Formation Defense and Evaluation Strategy [J]. Computer Science, 2021, 48(2): 55-63. |
[7] | SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363. |
[8] | GAO Shuai, XIA Liang-bin, SHENG Liang, DU Hong-liang, YUAN Yuan, HAN He-tong. Spatial Cylinder Fitting Based on Projection Roundness and Genetic Algorithm [J]. Computer Science, 2021, 48(11A): 166-169. |
[9] | YAO Ze-wei, LIU Jia-wen, HU Jun-qin, CHEN Xing. PSO-GA Based Approach to Multi-edge Load Balancing [J]. Computer Science, 2021, 48(11A): 456-463. |
[10] | GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80. |
[11] | JI Shun-hui, ZHANG Peng-cheng. Test Case Generation Approach for Data Flow Based on Dominance Relations [J]. Computer Science, 2020, 47(9): 40-46. |
[12] | DONG Ming-gang, HUANG Yu-yang, JING Chao. K-Nearest Neighbor Classification Training Set Optimization Method Based on Genetic Instance and Feature Selection [J]. Computer Science, 2020, 47(8): 178-184. |
[13] | LIANG Zheng-you, HE Jing-lin, SUN Yu. Three-dimensional Convolutional Neural Network Evolution Method for Facial Micro-expression Auto-recognition [J]. Computer Science, 2020, 47(8): 227-232. |
[14] | YANG De-cheng, LI Feng-qi, WANG Yi, WANG Sheng-fa, YIN Hui-shu. Intelligent 3D Printing Path Planning Algorithm [J]. Computer Science, 2020, 47(8): 267-271. |
[15] | FENG Bing-chao and WU Jing-li. Partheno-genetic Algorithm for Solving Static Rebalance Problem of Bicycle Sharing System [J]. Computer Science, 2020, 47(6A): 114-118. |
|