Search
Search Results
-
Computer network security and information security technology optimization by using Bayesian classification algorithm
The naive Bayesian classification algorithm is known for its perfect theoretical system, clear and simple star structure, good adaptability and high...
-
Design of Computer Network Security Defense System Based on Artificial Intelligence and Neural Network
In order to improve the effect of computer security defense, this paper applies artificial intelligence technology and neural network technology to...
-
Challenges and Potential Approaches in Wireless Sensor Network Security
A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the...
-
Risk Prediction Techniques for Power Control System Network Security
As a fundamental energy infrastructure, the power system has a direct impact on people’s daily lives and production. If the security of the...
-
RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm
With the development of Internet technology, the large number of network nodes and dynamic structure makes network security detection more complex,...
-
Development of computer network security management technology based on artificial intelligence under big data
With the growth of network technology, network security issues have gradually emerged, and people have gradually begun to focus on network security...
-
Exploring the landscape of network security: a comparative analysis of attack detection strategies
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are...
-
A network security situation assessment method based on fusion model
This research introduces an innovative network security situation assessment (NSSA) model, designed to overcome the shortcomings in feature...
-
Fog computing network security based on resources management
Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the...
-
Threat analysis for space information network based on network security attributes: a review
Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is...
-
Prediction and evaluation of wireless network data transmission security risk based on machine learning
The security of wireless network transmission data is an important technical index to ensure the reliable transmission of information in local areas,...
-
An Interactive Visualization System for Network Security Data
Data visualization is an important approach for data analysis, which can reveal the patterns and characteristics of complex datasets through visual...
-
Quantum deep learning-based anomaly detection for enhanced network security
Identifying and mitigating aberrant activities within the network traffic is important to prevent adverse consequences caused by cyber security...
-
Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review
The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency,...
-
Research on campus network security protection system framework based on cloud data and intrusion detection algorithm
The continuous progress of society has created conditions for the widespread use of information technology. People rely more and more on information...
-
RETRACTED ARTICLE: The design of network security protection trust management system based on an improved hidden Markov model
With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also...
-
Network Security and Trustworthiness
In 6G, a range of new technologies will emerge based on intelligent network structures. The connection between 6G technology and AI-based intelligent... -
Network-on-Chip Trust Validation Using Security Assertions
Recent technological advancements enabled integration of a wide variety of Intellectual Property (IP) cores in a single chip, popularly known as...
-
Efficient security framework against sybil attack in mobile adhoc network using EE-OLSR protocol scheme
This paper proposes a novel approach for enhancing the authentication and power optimization of Wireless Sensor Networks (WSNs) by using an Energy...
-
Deep Learning Based Hybrid Security Model in Wireless Sensor Network
Spatial positioning of the sensor nodes in the Wireless Sensor Networks (WSN) promotes remote monitoring of assets or target area in terms of...