This work is licensed under the Creative Commons Attribution 4.0 International License.
Wang, C., Yu, L., Chang, H., et al. (2020). Application ]Research of File Fingerprint Identification Detection Based on a Network Security Protection System. Wireless Communications and Mobile Computing, 2020, 1-14.Search in Google Scholar
Shen, G., Wang, W., Mu, Q., et al. (2020). Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security. Wireless Communications and Mobile Computing.Search in Google Scholar
Zheng, G., Gong, B., & Zhang, Y. (2021). Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks. Wireless Communications and Mobile Computing.Search in Google Scholar
Ren, Y., Leng, Y., Zhu, F., et al. (2019). Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network. Sensors, 19(10), 2395-.Search in Google Scholar
Ottenburger, S. S., Akmak, H. K., Jakob, W., et al. (2020). A Novel Optimization Method for Urban Resilient and Fair Power Distribution Preventing Critical Network States. International Journal of Critical Infrastructure Protection, 29, 100354.Search in Google Scholar
Ceccarelli, D., Pithewan, K., Belotti, S., et al. (2015). Requirements for Abstraction and Control of Transport Networks. Chinese Physics Letters, 13(2), 149-152.Search in Google Scholar
Dong, C., & Zhao, L. (2019). Sensor network security defense strategy based on attack graph and improved binary PSO. Safety Science, 117, 81-87.Search in Google Scholar
Degefa, F. B., Lee, D., Kim, J., et al. (2016). Performance and security enhanced authentication and key agreement protocol for SAE/LTE network. Computer Networks, 94(jan.15), 145-163.Search in Google Scholar
Ni, Z., Li, Q., & Liu, G. (2018). Game-Model-Based Network Security Risk Control. Computer, 51(4), 28-38.Search in Google Scholar
Weiming, T., Jixing, H., Yong, Z., et al. (2018). A Protection Method Based on Message Identification and Flow Monitoring for Managing the Congestion Arising From Network Attacks on Smart Substation. IEEE Communications Letters.Search in Google Scholar
Ding, K., Liu, Y., Cho, H. H., Zhang, X., & Wu, Z. (2016). Cooperative detection and protection for Interest flooding attacks in named data networking. International Journal of Communication Systems, 29(13), 1968-1980.Search in Google Scholar
Xu, L., Chen, L., Gao, Z., Wang, Z., & Xiong, N. (2020). DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Network, 34(1), 38-46.Search in Google Scholar
Zarca, A. M., Bernabe, J. B., Farris, I., & Marín, J. L. (2017). Enhancing IoT security through network softwarization and virtual security appliances. International Journal of Network Management.Search in Google Scholar
Liang, G., Weller, S. R., Luo, F., & Wang, Y. (2019). Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks. IEEE Transactions on Smart Grid, 10(3), 3162-3173.Search in Google Scholar
Liu, Y., & Morgan, Y. (2018). Security against Passive Attacks on Network Coding System - A Survey. Computer Networks, 138(June 19), 57-76.Search in Google Scholar
Ghaleb, A., Zhioua, S., & Almulhem, A. (2018). On PLC network security. International Journal of Critical Infrastructure Protection, 22(September), 62-69.Search in Google Scholar
Xu, L., Chen, L., Gao, Z., Wang, Z., & Xiong, N. (2020). DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Network, 34(1), 38-46.Search in Google Scholar
Gawande, P., & Dambhare, S. (2019). A new Predictive Analytic aided Response-Based System Integrity Protection Scheme. IET Generation Transmission & Distribution, 13(8).Search in Google Scholar
Yw, A., Hh, B., Nw, B., & Qa, H. (2020). An incentive-based protection and recovery strategy for secure big data in social networks. Information Sciences, 508, 79-91.Search in Google Scholar
Ni, Z., Li, Q., & Liu, G. (2018). Game-Model-Based Network Security Risk Control. Computer, 51(4), 28-38.Search in Google Scholar
Guo, J. C., Fan, D., Che, H. Y., et al. (2015). An approach to network security evaluation of computer network information system with triangular fuzzy information. Journal of Intelligent & Fuzzy Systems, 28(5), 2029-2035.Search in Google Scholar
Mason, D. (2015). Computer Network Security and Cyber Ethics, 4th edition. Online Information Review.Search in Google Scholar
Wang, J. (2021). Full‐scene network security protection system based on ubiquitous power Internet of things. International Journal of Communication Systems.Search in Google Scholar
Genge, B., Graur, F., & Haller, P. (2015). Experimental assessment of network design approaches for protecting industrial control systems. International Journal of Critical Infrastructure Protection, 11(DEC.), 24-38.Search in Google Scholar
Busquim, E., Piqueira, J., Cruz, J. J., et al. (2021). Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants. International journal on critical infrastructure protection, 34(SEP.).Search in Google Scholar
Wurzenberger, M., Skopik, F., Settanni, G., et al. (2016). Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools. Information Systems.Search in Google Scholar
Zhang, Y., Li, et al. (2015). INFORMATION MANAGEMENT AND SECURITY STRATEGY OF HOSPITAL COMPUTER NETWORK. Basic & clinical pharmacology & toxicology.Search in Google Scholar