Network security situation evaluation strategy based on cloud gravity center judgment

被引:2
|
作者
Zheng, Ruijuan [1 ]
Wei, Wangyang [1 ]
Zhang, Mingchuan [1 ]
Wu, Qingtao [1 ]
Zhang, Dan [1 ]
机构
[1] Information Engineering College, Henan University of Science and Technology, Luoyang, China
关键词
16;
D O I
10.4304/jnw.9.2.283-290
中图分类号
学科分类号
摘要
引用
收藏
页码:283 / 290
相关论文
共 50 条
  • [1] Security Strategy of Campus Network Data Center in Cloud Environment
    Ge Suhui
    Wan Quan
    Sun Wenhui
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 290 - 297
  • [2] Representation of Network Security Situation Elements Based on Cloud Model
    Kou Guang
    Yang Haopu
    Wang Kun
    Zhang Yuchen
    Wang Shuo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 215 - 224
  • [3] Network security situation prediction in the cloud environment based on grey neural network
    Shen, Liang
    Wen, Zhicheng
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2019, 19 (01) : 153 - 167
  • [4] The Study on Network Security Strategy based on Security Evaluation
    Bi, Yan
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
  • [5] A prediction model of cloud security situation based on evolutionary functional network
    Baowen Xie
    Guosheng Zhao
    Mianxing Chao
    Jian Wang
    Peer-to-Peer Networking and Applications, 2020, 13 : 1312 - 1326
  • [6] A prediction model of cloud security situation based on evolutionary functional network
    Xie, Baowen
    Zhao, Guosheng
    Chao, Mianxing
    Wang, Jian
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1312 - 1326
  • [7] Network Efficacy Evaluation Based on AHP for Network Security Situation Assessment
    Yuan, Zhichao
    Yao, Shan
    Xia, Chunhe
    Xiang, Shuang
    PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS, ENVIRONMENT, BIOTECHNOLOGY AND COMPUTER (MMEBC), 2016, 88 : 797 - 800
  • [8] A Strategy of Network Security Situation Autonomic Awareness
    Zheng, Ruijuan
    Zhang, Dan
    Wu, Qingtao
    Zhang, Mingchuan
    Yang, Chunlei
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 632 - 639
  • [9] Network Security Evaluation Model Based on Cloud Computing
    Yang, Jin
    Wang, Cilin
    Yu, Le
    Liu, Caiming
    Peng, Lingxi
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 488 - 495
  • [10] Research on Situation Evaluation Based on Artificial Immune for Network Security
    Zhang, Ruirui
    Xiao, Xin
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 4926 - 4930