You are on page 1of 12

Network Security and Technology Research

References

1.Xie Bo, "Analysis of the application of artificial intelligence technology in the information
management of archives [J / OL]", Electromechanical Engineering Technology, no. 11, pp. 40-
42, 2019.

2.Tao Tao, "Computer network security and preventive measures in the era of big data [J / OL]",
Science and Technology Innovation Herald, pp. 1-2.

3.Hao Xiaoyang, "Application of Virtual Private Network Technology in Computer Network


Information Security [J / OL]", Electronic Technology and Software Engineering, no. 22, pp.
197-198, 2019.

4.Wu Di, "Computer network security and preventive measures in the era of big data [J / OL]",
Electronic Technology and Software Engineering, no. 22, pp. 203-204, 2019.

5.Wang Jiajun, Zhang Yun, Huang Li, Li Bo and Huang Lijin, "Research on computer network
system port scanning and dangerous port closing method [J]", Electromechanical Information,
no. 33, pp. 99-100, 2019.

6.He Zaiping, "On the main hidden dangers and management methods of computer network
security [J]", Science and Technology, no. 32, pp. 102, 2019.

7.Chang Weidong, "Research on computer network information security and protective measures
in the era of big data [J]", China Management Informationization, vol. 22, no. 22, pp. 155-156,
2019.

8.Liu Saidong, "Discussion on Influencing Factors and Preventive Measures of Computer


Network Security Technology [J]", Hubei Agricultural Mechanization, no. 21, pp. 13-14, 2019.
9.Zhu Honghong, "Analysis of the integrated application of artificial intelligence technology in
the development of computer networks [J]", Computer Products and Circulation, no. 11, pp. 36,
2019.

Authors

Bao Junyan

2. A Formal Model for Network-Wide Security Analysis

3.

A.Attar and S.Hazelhurst. Fast packet filtering using n-ary decision diagrams. 2002. Technical
Report, School of Computer Sciene, University of the Witwatersrand.

4.D. Antoš. Hardware-constrained Packet Classification. PhD thesis, Masaryk University, 2006.

Jaroslav Rab

Petr Matousek

Ondrej Rysavy

Miroslav Sveda

3.Enabling Cyber Security Data Sharing for Large-scale Enterprises


Using Managed Security Services

5. WannaCry ransomware attack, [online] Available:


https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.
6. The cost of cyber crime, 2011, [online] Available:
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60943/the-cost-of-
cyber-crime-full-report.pdf.

Xiao-Si Wang

Ian Herwono

Francesco Di Cerbo

Paul Kearney

Mark Shackleton

4.Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools.

7.P. Naur and B. Randell, (Eds.). Software Engineering: Report of a conference sponsored by the
NATO Science Committee, Garmisch, Germany, 7-11 Oct. 1968, Brussels, Scientific Affairs
Division, NATO (1969) 231pp.

8.Asoke K Talukder and Manish Chaitanya, Architecting Secure Software Systems, Auerbach
Publications, 2008.

Asoke K. Talukder

Vineet Kumar Maurya

Babu G. Santhosh

Ebenezer Jangam

Sekhar V. Muni
K. P. Jevitha

Samanta Saurabh

Alwyn Roshan Pais

5.Information Security Monitoring System Based on Data Mining

9.Renaud Bidou, "Security Operation Center Concepts & Implementation"

http://www.iv2-technologies.com/~rbidou/ SOCConceptAndImplementation.pdf, August 1,


2005.

10. Jian-Qiang Zhai, Jun-Feng Tian, Rui-Zhong Du, Jian-Cai Huang, "Network Intrution Early
Warning Model Based on D-S Evidence Theory," Proceedings of the Second International
Conference on Machine Learning and Cybernetics, Xi'an, 2-5 November 2003.

Guangjuan Lv

Ruzhi Xu

Xiangrong Zu

Liwu Deng

6. Study on data acquisition solution of network security monitoring system.

11. Renaud Bidou, "Security Operation Center Concepts & Implementation", August 2005.

12. Jian_Qiang Zhai, Jun_Feng Tian, Rui_Zhong Du and Jian_Cai Huang, "Network Intrution
Early Warning Model Based on D-S Evidence Theory", Proceedings of the Second International
Conference on Machine Learning and Cybernetics, pp. 1972-1977, 2–5 November 2003.

Kunlun Gao

Jianming Liu

Jian Guo

Rui An
7.Network Security Monitoring

1.

IANA http://www.iana.org/assignments/port-numbers

2.

Kang H J, Kim M S, Hong J W-K, A Method on Multimedia Service Traffic Monitoring and
Analysis. In DSOM 2003. Heidelgerg, Germany Oct.2003. 93-105

3.

Thomas Karagiannis, Andre Borido, Michalis Faloutsos and Kc claffy. Transport Layer
Identification of P2P Traffic. In IMC'04, New York, NY ,USA, 2004. ACM Press 121-134
(Pubitemid 40372037)

4.

Chen Liang, Gong Jian, Xu Xuan Identification of application-level protocols using


characteristic .Computer Engineering and Applications (in Chinese) 2006, 42(24):16-19

5.

SEN S, SPATSCHECK O. WANG D. Accurate, Scalable in-network identification of P2P traffic


using application signatures. Proceedings of the 13th International conference on World Wide
Web .NY, ACM Press, 2004. 512-521 (Pubitemid 40752785)

Zhenbiao Lin

Xingyuan Chen

Yongwei Wang

8.Integrated workstations for reliable, site-independent security monitoring and control


15. E. Behrin, Safeguards and Security Upgrades at LLNL, 1987.

16. J. C. Smart, The Livermore Security Console, 1987.

J. Smart

9.Design of security integrated monitoring system

17. Che Hui, "Design of smart security community system based on Internet of things [J]",
Radio and television network, vol. 28, no. 1, pp. 41-44, 2021.

18. Zhu Ge, Mei Jun and Tao Fu Ling, "Research and design of intelligent security system for
Middle Route Project of South to North Water Diversion [J]", People's Yellow River, vol. 42, no.
12, pp. 119-122134, 2020.

Xinyu Sun

Rui Liu

Yangshuo Zhang

10.The research on data flow technology in computer network security monitoring

19. D. J. Abadi, D. Camey, U. Cetintemel, M. Cherniaek, C. Convey, S. Lee, et al., "Aurora: a


new model and architecture for data stream management", VLDBJournal, vol. 12, no. 2, pp. 120-
139, 2003.
20. S. B. Zdonik, M. Stonebraker, M. Chemiack, U. C etintemel, M. Balazinska and H.
Balakrishnan, "The Aurora and Medusa Projects", IEEE Data Engineering Bulletin, vol. 26, no.
1, pp. 3-10, 2003.

XiaoHong Yin

11.Component Based Security Control for Information Network

21. Tu Xu-yen, Large system1 cybernetics., Beijing:National Defence Industry Press, 2002.

22. Zhang Hong-qi, Information network security, Beijing:Tsinghua University Press, 2002.

Yu Wang

Jun Lu

Zhongwang Wu

Yu Lu

12.Construction of Network Security Perception System Using Elman Neural Network

23. ZHANG Haixia, WU Jianying, HUANG Kezhen et al., "Research on Data Fusion
Technology for Network Security [J]", Software Engineering and Application, vol. 10, no. 2, pp.
7, 2021.
24. W Zhi, X Zhou and L. Yang, "Application of Fuzzy Comprehensive Method and Analytic
Hierarchy Process in the Evaluation of Network Security Level Protection Research[J]", Journal
of Physics: Conference Series, vol. 1820, no. 1, pp.

Yun Kai

Huang Qiang

Ma Yixuan

13.Network Security Situation Prediction in Software Defined Networking Data Plane

25. N. McKeown, "Software-defined networking", INFOCOM keynote talk, vol. 17, no. 2, pp.
30-32, 2009.

26. N. McKeown et al., "OpenFlow: enabling innovation in campus networks", ACM SIGCOMM
Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.

Mingren Sheng

Hongri Liu

Xu Yang

Wei Wang

Junheng Huang

Bailing Wang

14.Research on the Application of Intelligent Learning Algorithms in Network Security Situation


Awareness and Prediction Methods
27. M Raissi and G E. Karniadakis, "Hidden Physics Models: Machine Learning of Nonlinear
Partialn Differential Equations[J]", Journal of Computational Physics, vol. 357, pp. 125-141,
2018.

28. N Poret, R R Twilley and R M. Coronado-Molina, "Object-based correction of LiDAR


DEMs using RTK-GPS data and machine learning modeling in the coastal Everglades[J]",
Environmental Modelling and Software, vol. 112, no. 3, pp. 491-496, 2018.

Zhihua Chen

15.Research on Network Security Situation Prediction-Oriented Adaptive Learning Neuron

29. P.I Antsaklis, "Neural networks for control systems" in Neural Networkl, IEEE Press,
Location, vol. 6, pp. 242-244, 1990.

30. Qian Li and Shuqing Wang, "Fast algorithm for adaptive generalized predictive control based
on BP neural networks", Proceedings of 2004 International Conference on Machine Learning
and Cybernetics, vol. 2, pp. 738-743, 2004.

Jing Li

Chunbo Dong

1.Security Model Based on Network Business Security

31. YuNing Wang, "Current Situation and Defense of Network Information Security[J]",
Modern Commerce Industry, 2008.

32. DongHui Jiang, "Security Offense and Defense Testing and Analysis of LAN[J]",
Science&Technology Information, 2009.

Wu Kehe
Zhang Tong

Li Wei

Ma Gang

17.Network Security Risk Assessment and Situation Analysis

33. Chen XZ, Zheng QH, Guan XH, Lin CG. Quantitative Hierarchical Threat Evaluation Model
for Network Security. Journal of Software, 2006,17(4):885-897

34. Bass T. Intrusion systems and multisensor data fusion: Creating cyberspace situational
awareness. Communications of the ACM, 2000,43(4):99 -105.

Liu Mixia

Yu Dongmei

Zhang Qiuyu

Zhu Honglei

18.Network management security

35. The Information Technology Security Evaluation Criteria (ITSEC), Version 1, May 2 1990.

36. "ISO 7498/2", Security Architecture.

R. Ward

P. Skeffington
19.Analysis of Computer Network Security Technology and

Preventive Measures under the Information Environment

37. Zhao Yuqing, "Analysis on Network Security Technology of Computer Laboratory for Cloud
Computing[J]", Network security technology and application, no. 11, pp. 90-91, 2020.

38. Xie Jinglu, "Application and optimization analysis of computer network security protection
technology under the background of information age[J]", China Computer & Communication,
vol. 32, no. 13, pp. 182-183, 2020.

Bin Ge

Jin Xu

20.Research on enterprise network security system

39. Q. Zhang, H. Li and J. Hu, "A study on security framework against advanced persistent
threat", IEEE International Conference on Electronics Information & Emergency
Communication, pp. 128-131, 2017.

40. C. Cinar, M. Alkan, M. Dorterler and I. Dogru, "A Study on Advanced Persistent Threat",
International Conference on Computer Science and Engineering (UBMK), pp. 116-121, 2018.

Jundan Hou

Xiang Jia

21. about solution for network security based on security domain


41.

Peng Shuanghe, Han Zhen and Shen Changxiang, "Security Protocol and Scheme for Inter-
Realm Information Accessing", Journal of Computer Research and Development, vol. 42, pp.
1587-1593, September 2005.

42.

Liu Quan, "Security Domain Research of Networked Control System", Control & Automation,
vol. 12, pp. 45-47, July 2006.

Yan Hui

Han Weijie

Wang Yu

You might also like