共 19 条
- [1] Putro P. A. W., Sensuse D. I., Review of Security Principles and Security Functions in Critical Information Infrastructure Protection, International Journal of Safety and Security Engineering, 12, 4, pp. 459-465, (2022)
- [2] Vatambeti R., Mamidisetti G., Routing Attack Detection Using Ensemble Deep Learning Model for IioT, Information Dynamics and Applications, 2, 1, pp. 31-41, (2023)
- [3] Jin M., Computer Network Information Security and Protection Strategy Based on Big Data Environment, International Journal of Information Technologies and Systems Approach, 16, 2, (2023)
- [4] Ayanwola T., Et al., Enhancing Face Spoofing Attack Detection: Performance Evaluation of a VGG-19 CNN Model, Acadlore Transactions on AI and Machine Learning, 2, 2, pp. 84-98, (2023)
- [5] Meng L., Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms, Mobile Information Systems, 2022, (2022)
- [6] Ohwo O. B., Et al., Advancing DNS Performance through an Adaptive Transport Layer Security Model (ad-TLSM), Ingénierie des Systèmes d'Information, 28, 3, pp. 777-790, (2023)
- [7] Yun K., Et al., A Network Security Approach based on Machine Learning, Proc. of the 2023 IEEE International Conference on Integrated Circuits and Communication Systems, pp. 1-5, (2023)
- [8] Saha T., Et al., Machine Learning Assisted Security Analysis of 5G-network-connected Systems, IEEE Transactions on Emerging Topics in Computing, 10, 4, pp. 2006-2024, (2022)
- [9] Alao D. O., Et al., The Need to Improve DNS Security Architecture: An Adaptive Security Approach, Information Dynamics and Applications, 2, 1, pp. 19-30, (2023)
- [10] Prasad B., Ramachandram S., Prevention and Detection Mechanisms for Re-entrancy Attack and King of Ether Throne Attack for Ethereum Smart Contracts, Ingénierie des Systèmes d'Information, 27, 5, pp. 725-735, (2022)