Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241100095-6.doi: 10.11896/jsjkx.241100095
• Information Security • Previous Articles Next Articles
WANG Keke1, BIAN Yue1, YIN Yanyan2
CLC Number:
| [1]YU C J.On the Security Construction of Public Security Video Network from the Angle of Graded Protection[J].China Public Security,2018(7):178-179. [2]FANG X,WANG H,XU X L,et.al.On the Security Construction of Network Video Monitoring System in Sensitive Information Places[J].Network Security Technology AND Application,2024(6):142-144. [3]ZOU T,TAO S,DONG F.Analysis on Security Risk Prevention and Governance of Network Video Monitoring System under the Background of Metauniverse[J].Computer Knowledge and Technology,2024,20(4):96-99,102. [4]ZHOU S H,TANG Y,YANG Q R,et al.A Security Evaluation Method of Video Surveillance System Based on Network Anti kill Chain[J].Security Science and Technology,2023(9):49-56. [5]XU Y Z.Network address planning of public security video surveillance project[J].Radio & Television Network,2023,30(8):56-58. [6]LIU P H.Design and Implementation of Video Surveillance Network Device Identification and Security Monitoring System[D].Beijing:Beijing University of Posts and Telecommunications,2023. [7]XU H.Research on Cyber-security of Railway Integrated Video Monitoring System[J].Railway Signalling & Communication Engineering,2023,20(5):39-43. [8]GAO J,WANG K Y,HUANG S H.Research on Security Evaluation Index System for Video Monitoring Network[J].Netinfo Security,2021,21(12):78-85. [9]ZHU L N,HUANG H B,ZHANG X F,et al.Analysis on Network Security Risks and Protective Measures of Industrial Intelligent Video Monitoring System[J].Security Science and Technology,2021(11):25-31. [10]WANG C L,GAO Q.Dynamic Evaluation Method of Multi-Video Surveillance Network Security Risk for Police Equipment[J].Journal of Ordnance Equipment Engineering,2021,42(10):218-223. [11]WANG T.Research on Current Situation and Security Problems of Network Video Monitoring System[J].Network Security Technology AND Application,2020(9):146-147. [12]YUAN D Y,HUANG S H,GAO J.Research on Current Situation and Countermeasures of Video Surveillance Network Security Based on Scanning Analysis[J].Science and Technology Management Research,2021,41(4):198-204. [13]YANG L M.Analysis of data security governance of public videomonitoring network[J].China Security & Protection,2020(7):10-13. [14]XUE Y P.Design of Network Video Monitoring System Based on Embedded System and Network Information Security[J].China Computer & Communication,2019(12):78-79. [15]LIU Y F.The Research on Network Security Access Protocolfor Power System Video Surveillance[D].Xi’an:Xidian University,2019. [16]CUI E Z.Application of information technology in network videomonitoring of refinery safety production[J].Digital Space,2018(4):247. [17]LI X K,LI B,SHI Y B,et al.Research on Wireless Video Monitoring System Technology for Safe Production under 4G Network[J].Computer Products and Circulation,2017(8):8. [18]CHEN S Y.Theory and Model of Variable Fuzzy Sets and Its Application[M].Dalian:Dalian University of Technology Press,2009. [19]BELL D E.Regret in Decision Making under Uncertainty[J].Operations Research,1982,30. [20]GREEN S L.Rational choice theory:An overview[J/OL].http://business.baylor.edu/steve_green/green1.doc. [21]YAO Y.A Evaluation Method Based on Regret Theory andGrey Entropy TOPSIS[J].Journal of Mathematics in Practice and Theory,2024(10):121-129. [22]TVERSKY A,KAHNEMAN D.Advances in Prospect Theory:Cumulative Representation of Uncertainty[J].Journal of Risk and Uncertainty,1992,5(4):297-323. |
| [1] | ZHU Shihao, PENG Kexing, MA Tinghuai. Graph Attention-based Grouped Multi-agent Reinforcement Learning Method [J]. Computer Science, 2025, 52(9): 330-336. |
| [2] | WANG Huiqiang, LIN Yang, LYU Hongwu. Survey on Formal Modelling and Quantitative Analysis Methods for Complex Systems [J]. Computer Science, 2025, 52(9): 346-359. |
| [3] | WANG Yuzhuo, LIU Haitao, YUAN Haojie, ZHAI Yali, ZHANG Zhihua. Bayesian Verification Scheme for Software Reliability Based on Staged Growth Test Information [J]. Computer Science, 2025, 52(9): 360-367. |
| [4] | ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375. |
| [5] | LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395. |
| [6] | YIN Shi, SHI Zhenyang, WU Menglin, CAI Jinyan, YU De. Deep Learning-based Kidney Segmentation in Ultrasound Imaging:Current Trends and Challenges [J]. Computer Science, 2025, 52(9): 16-24. |
| [7] | LI Yaru, WANG Qianqian, CHE Chao, ZHU Deheng. Graph-based Compound-Protein Interaction Prediction with Drug Substructures and Protein 3D Information [J]. Computer Science, 2025, 52(9): 71-79. |
| [8] | WU Hanyu, LIU Tianci, JIAO Tuocheng, CHE Chao. DHMP:Dynamic Hypergraph-enhanced Medication-aware Model for Temporal Health EventPrediction [J]. Computer Science, 2025, 52(9): 88-95. |
| [9] | HU Hailong, XU Xiangwei, LI Yaqian. Drug Combination Recommendation Model Based on Dynamic Disease Modeling [J]. Computer Science, 2025, 52(9): 96-105. |
| [10] | SU Shiyu, YU Jiong, LI Shu, JIU Shicheng. Cross-domain Graph Anomaly Detection Via Dual Classification and Reconstruction [J]. Computer Science, 2025, 52(8): 374-384. |
| [11] | SUN Jingyu, HUANG He, SUN Yu'e, ZHANG Boyu. Super Spreader Detection Algorithm Based on Adaptive Sampling [J]. Computer Science, 2025, 52(8): 393-402. |
| [12] | DAI Xiangguang, HE Chenglong, GUAN Mingyu, ZHANG Wei, ZHOU Yang, LIU Jianfeng, LYU Qingguo. State-decomposition Distributed Dual Averaging Algorithm for Privacy Online ConstrainedOptimization over Directed Networks [J]. Computer Science, 2025, 52(8): 411-420. |
| [13] | LIU Hongle, CHEN Juan, FU Cai, HAN Lansheng, GUO Xiaowei, JIANG shuai. Authorship Gender Recognition of Source Code Based on Multiple Mixed Features [J]. Computer Science, 2025, 52(8): 51-61. |
| [14] | ZHAO Shengyu, PENG Jiaheng, WANG Wei, HUANG Fan. OpenRank Dynamics:Influence Evaluation and Dynamic Propagation Models for Open SourceEcosystems [J]. Computer Science, 2025, 52(8): 62-70. |
| [15] | TANG Boyuan, LI Qi. Review on Application of Spatial-Temporal Graph Neural Network in PM2.5 ConcentrationForecasting [J]. Computer Science, 2025, 52(8): 71-85. |
|
||