共 43 条
[21]
Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network
[J].
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,
2020, 14 (04)
:1773-1795
[23]
A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems
[J].
36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022),
2022,
:454-459
[25]
The Research of the Network Security Situation Prediction mechanism Based on the complex network
[J].
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN),
2015,
:1183-1187
[27]
Active defense mechanism for network security situation prediction based on transformer and TCN
[J].
ENGINEERING RESEARCH EXPRESS,
2025, 7 (02)
[28]
A security policy and Network Cartography based Intrusion Detection and Prevention Systems
[J].
JOURNAL OF INFORMATION ASSURANCE AND SECURITY,
2009, 4 (04)
:279-291
[29]
Security analysis model of intrusion tolerant systems based on game theory
[J].
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology,
2013, 35 (08)
:1933-1939
[30]
Intelligent agents model for network security based on artificial immune systems
[J].
DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS,
2007, 14
:673-679