共 50 条
- [31] Research on Computer Network Security [J]. 3RD INTERNATIONAL SYMPOSIUM ON MECHATRONICS AND INDUSTRIAL INFORMATICS, (ISMII 2017), 2017, : 235 - 240
- [32] Contextual filtering and prioritization of computer application logs for security situational awareness [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 668 - 680
- [34] Visualization Techniques for Computer Network Defense [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE X, 2011, 8019
- [35] POSTER: Security Logs Graph Analytics for Industry Network System [J]. PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 1043 - 1045
- [36] Usage control in computer security: A survey [J]. COMPUTER SCIENCE REVIEW, 2010, 4 (02) : 81 - 99
- [37] Security in Network Virtualization: A Survey [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (04): : 801 - 817
- [38] Network Security and Metrology: A Survey [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (11): : 251 - 270
- [39] Sensor Network Security: A Survey [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 52 - 73
- [40] Survey on Wireless Network Security [J]. Archives of Computational Methods in Engineering, 2022, 29 : 1591 - 1610