Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJune 2024
Network Information Security Monitoring Under Artificial Intelligence Environment
International Journal of Information Security and Privacy (IJISP-IGI), Volume 18, Issue 1Pages 1–24https://doi.org/10.4018/IJISP.345038At present, network attack means emerge in endlessly. The detection technology of network attack must be constantly updated and developed. Based on this, the two stages of network attack detection (feature selection and traffic classification) are ...
- articleJune 2022
A Network Attack Risk Control Framework for Large-Scale Network Topology Driven by Node Importance Assessment
International Journal of Grid and High Performance Computing (IJGHPC-IGI), Volume 14, Issue 1Pages 1–22https://doi.org/10.4018/IJGHPC.301590In large-scale network scenarios, network security data are characterized by complex association and redundancy, forming network security big data, which makes network security attack and defense more complicated. In this paper, the authors propose a ...
- articleJanuary 2018
Evaluation of the Attack Effect Based on Improved Grey Clustering Model
International Journal of Digital Crime and Forensics (IJDCF), Volume 10, Issue 1Pages 92–100https://doi.org/10.4018/IJDCF.2018010108There are a lot of uncertainties and incomplete information problems on network attack. It is of great value to access the effect of the attack in the current network attack and defense. This paper examines the characteristics of network attacks, there ...
- articleJanuary 2017
Investigation Approach for Network Attack Intention Recognition
International Journal of Digital Crime and Forensics (IJDCF), Volume 9, Issue 1Pages 17–38https://doi.org/10.4018/IJDCF.2017010102Sensitive information has critical risks when transmitted through computer networks. Existing protection systems still have limitations with treating network information with sufficient confidentiality, integrity, and availability. The rapid development ...
- ArticleNovember 2013
Research of Trust Model Based on Peer-to-Peer Network Security
ITA '13: Proceedings of the 2013 International Conference on Information Technology and ApplicationsPages 126–129https://doi.org/10.1109/ITA.2013.35P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false ...