Accesso libero

Model Construction and Analysis of Deep Learning-based Cybersecurity Awareness Enhancement for College Students

  
04 nov 2023
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Tao, Y. (2017). Research on the theoretical thoroughness of ideological and political education under internet age. Revista de la Facultad de Ingenieria, 32(16), 202-208. Search in Google Scholar

Zhang, T., & Wu, X. (2017). Research on intelligent logistics development model based on internet of things and cloud computing in big data age. Revista de la Facultad de Ingenieria, 32(6), 341-346. Search in Google Scholar

Golaszewski, E., Sherman, A. T., Oliva, L., Peterson, P. A. H., & Suess, J. (2020). Project-based learning continues to inspire cybersecurity students: the 2018-2019 sfs research studies at umbc. ACM Inroads, 11(2), 46-54. Search in Google Scholar

Ppper, C., Maniatakos, M., & Pietro, R. D. (2021). Cyber security research in the arab region: a blooming ecosystem with global ambitions. Communications of the ACM, 64(4), 96-101. Search in Google Scholar

Durakovskiy, A. P., Gavdan, G. P., Korsakov, I. A., & Melnikov, D. A. (2021). About the cybersecurity of automated process control systems. Procedia Computer Science, 190(4), 217-225. Search in Google Scholar

Georgiadou, A., Mouzakitis, S., & Askounis, D. (2021). Detecting insider threat via a cyber-security culture framework. Journal of Computer Information Systems, 1-11. Search in Google Scholar

Naeem, M. A. A., Abubakar, A., & Rahman, M. M. H. (2020). Dealing with well-formed and malformed packets, associated with point of failure that cause network security breach. IEEE Access, 8, 197554-197566. Search in Google Scholar

Kiran, J. S., & Reddy, P. (2020). Cyber security and risk analysis on connected autonomous vehicles. Solid State Technology, 63(2s), 10161-10176. Search in Google Scholar

Zhan, K. (2021). Design of computer network security defense system based on artificial intelligence and neural network. Journal of Intelligent and Fuzzy Systems(9), 1-13. Search in Google Scholar

Charles, S., & Mishra, P. (2021). A survey of network-on-chip security attacks and countermeasures. ACM Computing Surveys, 54(5), 1-36. Search in Google Scholar

Psychoula, I., Chen, L., & Amft, O. (2020). Privacy risk awareness in wearables and the internet of things. IEEE Pervasive Computing, 19(3), 60-66. Search in Google Scholar

Dai, Y., Li, W., Miao, W., Zhang, M., & Li, Y. (2021). Research on security strategies in the power wireless private network. Procedia Computer Science, 183, 395-400. Search in Google Scholar

Xia, F., Che, T., & Wang, W. (2017). Research on the network security risk control based on game model. Boletin Tecnico/Technical Bulletin, 55(4), 639-643. Search in Google Scholar

Behi, M., Ghasemigol, M., & Vahdat-Nejad, H. (2018). A new approach to quantify network security by ranking of security metrics and considering their relationships. International Journal of Network Security, 20(1), 141-148. Search in Google Scholar

Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568. Search in Google Scholar

Vajjha, H. V. V., & Sushma, P. (2021). Techniques and limitations in securing the log files to enhance network security and monitoring. Solid State Technology, 64(2), 1-8. Search in Google Scholar

Du, Z. (2021). Network security model based on active and passive defense hybrid strategy. Converter, 45-51. Search in Google Scholar

Jiang, C. (2022). Network security and ideological security based on wireless communication and big data analysis. Wireless Communications and Mobile Computing, 2022(3), 1-6. Search in Google Scholar

Vrhovec, S., Fujs, D., Jelovan, L., & Mihelic, A. (2020). Evaluating case study and action research reports: real-world research in cybersecurity. Journal of Universal Computer Science, 26(7), 827-853. Search in Google Scholar

Chen, S., Wu, Z., & Christofides, P. D. (2021). Cyber-security of centralized, decentralized, and distributed control-detector architectures for nonlinear processes. Chemical Engineering Research and Design, 165, 25-39. Search in Google Scholar

Young-Jin, Cha, Wooram, Choi, Oral, & Büyüköztürk. (2017). Deep learning-based crack damage detection using convolutional neural networks. Computer Aided Civil & Infrastructure Engineering. 361-378 Search in Google Scholar

Park, J. H. (2018). Practical approaches based on deep learning and social computing. Journal of Information Processing Systems, 14(1), 1-5. Search in Google Scholar

Hui, Z., Jing, C., & Taining, W. (2022). Research on simulation analysis of physical training based on deep learning algorithm. Scientific Programming, 2022, 1-11. Search in Google Scholar

Zhu, L., Zhang, Y., Wang, J., Tian, W., & Chu, Y. (2021). Downscaling snow depth mapping by fusion of microwave and optical remote-sensing data based on deep learning. Remote Sensing. 584-584. Search in Google Scholar

Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro