Showing 41 - 60 results of 414 for search '"network security"', query time: 0.07s Refine Results
  1. 41

    5G Networks Security Mitigation Model: An ANN-ISM Hybrid Approach by Rafiq Ahmad Khan, Habib Ullah Khan, Hathal Salamah Alwageed, Hussein Al Hashimi, Ismail Keshta

    Published 2025-01-01
    “…This paper presents a new security mitigation model using artificial neural network (ANN) with interpretive structure modeling (ISM) to improve the 5G network security system. The main goal of this study is to develop a 5G network security mitigation model (5GN-SMM) that leverages the predictive capabilities of ANN and the analysis of ISM to identify and mitigate security threats by providing practices in 5G networks. …”
    Get full text
    Article
  2. 42
  3. 43

    Self-corrected coefficient smoothing method based network security situation prediction by Hongyu YANG, Xugao ZHANG

    Published 2020-05-01
    “…In order to solve the problem of insufficient accuracy of current network security situation prediction methods,a new network security situation prediction model was proposed based on self-correcting coefficient smoothing.Firstly,a network security assessment quantification method was designed to transform the alarm information into situation real value time series based on the entropy correlation degree.Then,the adaptive solution of the static smoothing coefficient was calculated and the predicted initial value was obtained by using the variable domain space.Finally,based on the error category,the time-changing weighted Markov chain was built to modify the initial network situation prediction result and the prediction accuracy was further raised.The prediction model was tested with LL_DOS_1.0 dataset and the experimental results show that the proposed model has higher adaptability and prediction accuracy for network situation time series.…”
    Get full text
    Article
  4. 44
  5. 45

    A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature by Y. P. Jiang, C. C. Cao, X. Mei, H. Guo

    Published 2016-01-01
    “…These days, in allusion to the traditional network security risk evaluation model, which have certain limitations for real-time, accuracy, characterization. …”
    Get full text
    Article
  6. 46
  7. 47

    A network security situation prediction method based on hidden Markov model by Xiong ZHAN, Hao GUO, Peng ZHANG, Shu MAO

    Published 2015-12-01
    Subjects: “…network security situation prediction…”
    Get full text
    Article
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52

    Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data by Lan Liu, Jun Lin, Jun Cai

    Published 2014-07-01
    “…In the age of big data, large-scale, complexity of heterogeneous network security behavior should be considered. According to the features of huge amount and complex, big data analysis technologies for network security monitoring were proposed. …”
    Get full text
    Article
  13. 53

    Improved Population Intelligence Algorithm and BP Neural Network for Network Security Posture Prediction by Yueying Li, Feng Wu

    Published 2023-01-01
    “…To address the problems of low prediction accuracy and slow convergence of the network security posture prediction model, a population intelligence optimization algorithm is proposed to improve the network security posture prediction model of the BP neural network. …”
    Get full text
    Article
  14. 54
  15. 55

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  16. 56

    Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology by Xiaokun Zheng

    Published 2022-01-01
    “…In order to detect the computer network security technology vulnerabilities due to various factors, the normal operation of the computer network must be ensured, the user’s confidential information must be protected, and it is proposed that the analysis and research on security vulnerability detection must be strengthened. …”
    Get full text
    Article
  17. 57

    Charging wireless sensor network security technology based on encryption algorithms and dynamic model by Yuanming Li, Wei Guo, Xuejun Meng, Wen Xia

    Published 2020-02-01
    “…Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. …”
    Get full text
    Article
  18. 58

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents by Hui He, Guotao Fan, Jianwei Ye, Weizhe Zhang

    Published 2013-01-01
    “…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
    Get full text
    Article
  19. 59

    Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats by Mingjie Ma, Fenggang Sun, Lidong Zhai, Yuejin Du

    Published 2014-07-01
    “…The security challenges in the new network security threats which our country was facing were analyzed and recommendations for future network development in China in the field of information security were put forward.…”
    Get full text
    Article
  20. 60

    Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach by Armita Kazeminajafabadi, Mahdi Imani

    Published 2024-01-01
    “…To address these challenges, this paper proposes a partially observable Markov decision process (POMDP) model for network security under uncertainty. The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. …”
    Get full text
    Article