共 19 条
[1]
Putro P. A. W., Sensuse D. I., Review of Security Principles and Security Functions in Critical Information Infrastructure Protection, International Journal of Safety and Security Engineering, 12, 4, pp. 459-465, (2022)
[2]
Vatambeti R., Mamidisetti G., Routing Attack Detection Using Ensemble Deep Learning Model for IioT, Information Dynamics and Applications, 2, 1, pp. 31-41, (2023)
[3]
Jin M., Computer Network Information Security and Protection Strategy Based on Big Data Environment, International Journal of Information Technologies and Systems Approach, 16, 2, (2023)
[4]
Ayanwola T., Et al., Enhancing Face Spoofing Attack Detection: Performance Evaluation of a VGG-19 CNN Model, Acadlore Transactions on AI and Machine Learning, 2, 2, pp. 84-98, (2023)
[5]
Meng L., Internet of Things Information Network Security Situational Awareness Based on Machine Learning Algorithms, Mobile Information Systems, 2022, (2022)
[6]
Ohwo O. B., Et al., Advancing DNS Performance through an Adaptive Transport Layer Security Model (ad-TLSM), Ingénierie des Systèmes d'Information, 28, 3, pp. 777-790, (2023)
[7]
Yun K., Et al., A Network Security Approach based on Machine Learning, Proc. of the 2023 IEEE International Conference on Integrated Circuits and Communication Systems, pp. 1-5, (2023)
[8]
Saha T., Et al., Machine Learning Assisted Security Analysis of 5G-network-connected Systems, IEEE Transactions on Emerging Topics in Computing, 10, 4, pp. 2006-2024, (2022)
[9]
Alao D. O., Et al., The Need to Improve DNS Security Architecture: An Adaptive Security Approach, Information Dynamics and Applications, 2, 1, pp. 19-30, (2023)
[10]
Prasad B., Ramachandram S., Prevention and Detection Mechanisms for Re-entrancy Attack and King of Ether Throne Attack for Ethereum Smart Contracts, Ingénierie des Systèmes d'Information, 27, 5, pp. 725-735, (2022)