This work is licensed under the Creative Commons Attribution 4.0 International License.
Tao, Y. (2017). Research on the theoretical thoroughness of ideological and political education under internet age. Revista de la Facultad de Ingenieria, 32(16), 202-208.Search in Google Scholar
Zhang, T., & Wu, X. (2017). Research on intelligent logistics development model based on internet of things and cloud computing in big data age. Revista de la Facultad de Ingenieria, 32(6), 341-346.Search in Google Scholar
Golaszewski, E., Sherman, A. T., Oliva, L., Peterson, P. A. H., & Suess, J. (2020). Project-based learning continues to inspire cybersecurity students: the 2018-2019 sfs research studies at umbc. ACM Inroads, 11(2), 46-54.Search in Google Scholar
Ppper, C., Maniatakos, M., & Pietro, R. D. (2021). Cyber security research in the arab region: a blooming ecosystem with global ambitions. Communications of the ACM, 64(4), 96-101.Search in Google Scholar
Durakovskiy, A. P., Gavdan, G. P., Korsakov, I. A., & Melnikov, D. A. (2021). About the cybersecurity of automated process control systems. Procedia Computer Science, 190(4), 217-225.Search in Google Scholar
Georgiadou, A., Mouzakitis, S., & Askounis, D. (2021). Detecting insider threat via a cyber-security culture framework. Journal of Computer Information Systems, 1-11.Search in Google Scholar
Naeem, M. A. A., Abubakar, A., & Rahman, M. M. H. (2020). Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8, 197554-197566.Search in Google Scholar
Kiran, J. S., & Reddy, P. (2020). Cyber security and risk analysis on connected autonomous vehicles. Solid State Technology, 63(2s), 10161-10176.Search in Google Scholar
Zhan, K. (2021). Design of computer network security defense system based on artificial intelligence and neural network. Journal of Intelligent and Fuzzy Systems(9), 1-13.Search in Google Scholar
Charles, S., & Mishra, P. (2021). A survey of network-on-chip security attacks and countermeasures. ACM Computing Surveys, 54(5), 1-36.Search in Google Scholar
Psychoula, I., Chen, L., & Amft, O. (2020). Privacy risk awareness in wearables and the internet of things. IEEE Pervasive Computing, 19(3), 60-66.Search in Google Scholar
Dai, Y., Li, W., Miao, W., Zhang, M., & Li, Y. (2021). Research on security strategies in the power wireless private network. Procedia Computer Science, 183, 395-400.Search in Google Scholar
Xia, F., Che, T., & Wang, W. (2017). Research on the network security risk control based on game model. Boletin Tecnico/Technical Bulletin, 55(4), 639-643.Search in Google Scholar
Behi, M., Ghasemigol, M., & Vahdat-Nejad, H. (2018). A new approach to quantify network security by ranking of security metrics and considering their relationships. International Journal of Network Security, 20(1), 141-148.Search in Google Scholar
Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568.Search in Google Scholar
Vajjha, H. V. V., & Sushma, P. (2021). Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 64(2), 1-8.Search in Google Scholar
Du, Z. (2021). Network security model based on active and passive defense hybrid strategy. Converter, 45-51.Search in Google Scholar
Jiang, C. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6.Search in Google Scholar
Vrhovec, S., Fujs, D., Jelovan, L., & Mihelic, A. (2020). Evaluating case study and action research reports: real-world research in cybersecurity. Journal of Universal Computer Science, 26(7), 827-853.Search in Google Scholar
Chen, S., Wu, Z., & Christofides, P. D. (2021). Cyber-security of centralized, decentralized, and distributed control-detector architectures for nonlinear processes. Chemical Engineering Research and Design, 165, 25-39.Search in Google Scholar
Young-Jin, Cha, Wooram, Choi, Oral, & Büyüköztürk. (2017). Deep learning-based crack damage detection using convolutional neural networks. Computer Aided Civil & Infrastructure Engineering. 361-378Search in Google Scholar
Park, J. H. (2018). Practical approaches based on deep learning and social computing. Journal of Information Processing Systems, 14(1), 1-5.Search in Google Scholar
Hui, Z., Jing, C., & Taining, W. (2022). Research on simulation analysis of physical training based on deep learning algorithm. Scientific Programming, 2022, 1-11.Search in Google Scholar
Zhu, L., Zhang, Y., Wang, J., Tian, W., & Chu, Y. (2021). Downscaling snow depth mapping by fusion of microwave and optical remote-sensing data based on deep learning. Remote Sensing. 584-584.Search in Google Scholar