Self-Organized Network Management and Computing of Intelligent Solutions to Information Security

被引:24
作者
Zhu, Xiaomeng [1 ]
机构
[1] China Hohai Univ, Sch Publ Adm, Nanjing 211100, Peoples R China
关键词
Information Security; Intelligent Solutions; Network Computing; Self-Organized Network Management; ACCEPTANCE;
D O I
10.4018/JOEUC.20211101.oa28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The network in the information age has become an important part of life, but in the process of in-depth application of computers and networks, information security issues have also become a significant obstacle to their development. The intelligent solution to information security is a self-organized management and computing security protocol that is completed through the intelligent technologies at both ends of the sensing device and network authentication center. The results show that the network security information communication and publicity management platform built by the self-organized network management and computing of the intelligent solutions to information security can effectively heighten network user awareness of information protection, enhance the security of network environment, and promote the improvement of scientific network security rules. The study results of this paper provide a reference for further studies on self-organized network management and computing of intelligent solutions to information security.
引用
收藏
页数:16
相关论文
共 25 条
[1]  
AHMED AA, 2017, INT J-TORONTO
[2]  
Ajulo E. B., 2018, J INFORM, V4, P1
[3]   Factors that Influence the Acceptance of Internet of Things Services by Customers of Telecommunication Companies in Jordan [J].
Al-Momani, Adai Mohammad ;
Mahmoud, Moamin A. ;
Ahmad, Mohd Sharifuddin .
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) :51-63
[4]   Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) Model Comparison [J].
Al-Shawabkeh, Mahmoud ;
Saudi, Madihah Mohd ;
Alwi, Najwa Hayati Mohd ;
Azman, Norhidayah .
ADVANCED SCIENCE LETTERS, 2017, 23 (06) :5237-5241
[5]   Protection of standard network protocols of automated production control systems [J].
Burtsev A.G. ;
Klishevich D.M. ;
Polyanskii A.V. .
Russian Engineering Research, 2017, 37 (03) :224-232
[6]   Unsupervised learning clustering and self-organized agents applied to help network management [J].
Carvalhoa, Luiz Fernando ;
Barbon, Sylvio, Jr. ;
Mendes, Leonardo de Souza ;
Proenca, Mario Lemes, Jr. .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 54 :29-47
[7]   Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology [J].
Dagher, Gaby G. ;
Mohler, Jordan ;
Milojkovic, Matea ;
Marella, Praneeth Babu .
SUSTAINABLE CITIES AND SOCIETY, 2018, 39 :283-297
[8]   Cloud-Trust-a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds [J].
Gonzales, Dan ;
Kaplan, Jeremy M. ;
Saltzman, Evan ;
Winkelman, Zev ;
Woods, Dulani .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) :523-536
[9]   Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things [J].
Hu, Pengfei ;
Ning, Huansheng ;
Qiu, Tie ;
Song, Houbing ;
Wang, Yanna ;
Yao, Xuanxia .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1143-1155
[10]   The Internet of Things: a security point of view [J].
Li, Shancang ;
Tryfonas, Theo ;
Li, Honglei .
INTERNET RESEARCH, 2016, 26 (02) :337-359