-
21
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01“…Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS vulnerability including type of the reflective,stored,and DOM,SQL injection vulner-ability and session authentication management vulnerability were studied.The corresponding preventive measures of the three kinds of vulnerabilities were put forward.…”
Get full text
Article -
22
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
23
Quantitative method for network security situation based on attack prediction
Published 2017-10-01“…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
Get full text
Article -
24
Survey on rail transit mobile edge computing network security
Published 2023-04-01Get full text
Article -
25
Optimal Management of Computer Network Security in the Era of Big Data
Published 2022-01-01Get full text
Article -
26
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
27
Challenges and innovative solutions of space-ground integrated network security
Published 2024-06-01Subjects: Get full text
Article -
28
Network security situation evaluation method for multi-step attack
Published 2017-01-01“…Aiming at analyzing the influence of multi-step attack,as well as reflecting the system’s security situation accurately and comprehensively,a network security situation evaluation method for multi-step attack was proposed.This method firstly clustered security events into several attack scenes,which was used to identify the attacker.Then the attack path and the attack phase were identified by causal correlation of every scene.Finally,combined with the attack phase as well as the threat index,the quantitative standard was established to evaluate the network security situation.The proposed method is assessed by two network attack-defense experiments,and the results illustrate accuracy and effectiveness of the method.…”
Get full text
Article -
29
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01Subjects: Get full text
Article -
30
Research on LoRa network security schemes based on RF fingerprint
Published 2021-12-01Subjects: Get full text
Article -
31
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
32
Network security equipment evaluation based on attack tree with risk fusion
Published 2017-07-01Get full text
Article -
33
Network security of the National Natural Science Foundation of China: today and prospects
Published 2022-12-01Subjects: Get full text
Article -
34
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
35
Wireless Mesh network secure routing mechanism based on dynamic reputation
Published 2019-04-01Get full text
Article -
36
Reduction algorithm based on supervised discriminant projection for network security data
Published 2021-06-01“…In response to the problem that for dimensionality reduction, traditional manifold learning algorithm did not consider the raw data category information, and the degree of clustering was generally at a low level, a manifold learning dimensionality reduction algorithm with supervised discriminant projection (SDP) was proposed to improve the dimensionality reduction effects of network security data.On the basis of the nearest neighbor matrix, the label information of the raw data category was exploited to construct a supervised discriminant matrix in order to translate unsupervised popular learning into supervised learning.The target was to find a low dimensional projective space with both maximum global divergence matrix and minimum local divergence matrix, ensuring that the same kind of data was concentrated and heterogeneous data was scattered after dimensionality reduction projection.The experimental results show that the SDP algorithm, compared with the traditional dimensionality reduction algorithms, can effectively remove redundant data with low time complexity.Meanwhile the data after dimensionality reduction is more concentrated, and the heterogeneous samples are more dispersed, suitable for the actual network security data analysis model.…”
Get full text
Article -
37
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01Subjects: “…network security…”
Get full text
Article -
38
Improving Network Security: An Intelligent IDS with RNN-LSTM and Grey Wolf Optimization
Published 2024-12-01“…The architecture of this RNN-LSTM with GWO IDS provides capable and responsive intrusion detection, training on previous data to be able to detect new threats. Made for network security by combining deep learning and optimization, tests reached 99.5% accurate. …”
Get full text
Article -
39
Evaluating the network security by the Read<sub>W</sub>rite transition model
Published 2010-01-01Subjects: Get full text
Article -
40
Enhancing IoT Network Security Through Digital Object Architecture-Based Approaches
Published 2024-03-01Get full text
Article