网络安全 参考文献

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

网络安全参考文献
参考文献:
1. Wang, Q., Chen, J., & Lou, W. (2013). Optimized Checkpointing and Recovery for High-Speed Networks. IEEE Transactions on Parallel and Distributed Systems, 24(5), 1013-102
2.
2. Khan, K., Wang, H., & Lu, J. (2020). A Comprehensive Survey of Internet-of-Things (IoT) Authentication and Access Control Mechanisms. ACM Computing Surveys, 53(3), 1-37.
3. Zhu, Q., Ren, Z., & Ma, C. (2019). Blockchain-Based Cybersecurity Framework for IoT Systems. IEEE Internet of Things Journal, 6(1), 1566-1575.
4. Zou, D., Zhang, Y., Venkatasubramanian, N., & Vasilakos, A. (2015). A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal, 1(1), 1-1.
5. Lim, D., Luo, J. J., Sharma, P., & Van Oorschot, P. C. (2019). Security and Privacy in Emerging Pervasive Computing Models: A Survey. IEEE Communications Surveys & Tutorials, 21(1), 473-520.
6. Liu, Y., Jin, H., & Gao, L. (2020). Deep Learning for Malware Detection and Analysis: Foundations and Advances. IEEE Access, 8, 144403-144421.
7. Gao, Y., Gao, L., Zhang, H., Guo, S., & Xu, S. (2019). Machine Learning in Intrusion Detection: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 21(3), 2664-2692.
8. Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
9. Cheng, P. C., Qu, G., & Zhang, W. (2018). A Survey on
Network Anomaly Detection Using Machine Learning Techniques. IEEE Transactions on Network and Service Management, 15(1), 276-288.
10. Tan, Y., Zhang, Z., & Xia, G. S. (2019). AI-Based Network Security: Intrusion Detection and Defense. IEEE Network, 33(5), 664-670.。

相关文档
最新文档