-
81
Survey on the visualization technologies of threatening security data in cyber space
Published 2018-02-01“…With the rapid development of the cyber threatening methods,the requirements of network security data analysis become more and more imperative.Data visualization has already evolved as a requisite tool among all kinds of data analysis theory framework and applications,especially in the fields of scientific computation,business intelligence and cyber security.Threatening security data visualization provides various effective interaction means which improve the perception ability for the cyber security specialists to get a distinctive insight into the large amount of complicated cyber security problems.The state-of-art cyber security data visualization technologies were introduced.Some existing problems that were still challenging research topics were investigated.Some directions for future studies were outlined.…”
Get full text
Article -
82
Towards a Severity Assessment Method for Potential Cyber Attacks to Connected and Autonomous Vehicles
Published 2020-01-01“…According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. …”
Get full text
Article -
83
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01Get full text
Article -
84
-
85
Deep Recurrent Model for Server Load and Performance Prediction in Data Center
Published 2017-01-01Get full text
Article -
86
-
87
Modeling and Analysis of the Spread of Malware with the Influence of User Awareness
Published 2021-01-01Get full text
Article -
88
Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service
Published 2017-01-01Get full text
Article -
89
Increasing the cyber resilience of SMEs through open-source solutions and international collaboration
Published 2025-01-01Get full text
Article -
90
A Two-Stage Greedy Genetic Algorithm for Simultaneous Delivery and Monitoring Tasks with Time Windows
Published 2025-01-01Get full text
Article -
91
Reinforcement Learning Based Stochastic Shortest Path Finding in Wireless Sensor Networks
Published 2019-01-01Get full text
Article -
92
-
93
Norm‐based zeroing neural dynamics for time‐variant non‐linear equations
Published 2024-12-01Get full text
Article -
94
Named Entity Recognition Model Based on the Fusion of Word Vectors and Category Vectors
Published 2024-01-01Get full text
Article -
95
ESD-YOLOv8: An Efficient Solar Cell Fault Detection Model Based on YOLOv8
Published 2024-01-01Get full text
Article -
96
Generating User Privacy-Controllable Synthetic Data for Recommendation Systems
Published 2025-01-01Get full text
Article -
97
-
98
An Improved Harmony Search Algorithm for Proactive Routing Protocol in VANET
Published 2021-01-01Get full text
Article -
99
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
Published 2018-12-01Get full text
Article -
100
Mathematical Modeling of Cyberattack Defense Mechanism Using Hybrid Transfer Learning With Snow Ablation Optimization Algorithm in Critical Infrastructures
Published 2025-01-01“…To certify the security of critical infrastructures, numerous cyber security solutions must be taken together and the essential infrastructure must be developed. …”
Get full text
Article