A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data |
Lin, Weiwei
(School of Big Data and Artificial Intelligence, Fujian Polytechnic Normal University)
Yang, Chaofan (School of Computer Science and Mathematics, Fujian University of Technology) Zhang, Zeqing (School of Information Science and Engineering, Xiamen University) Xue, Xingsi (School of Computer Science and Mathematics, Fujian University of Technology) Haga, Reiko (CommScope Japan KK) |
1 | K. N. Lei, Y. Q. Zhang, C. S. Wu and H. Ma, "A System for Scoring the Exploitability of Vulnerability Based Types," Journal of Computer Research and Development, vol. 54, no. 10, pp. 2296-2309, 2017. |
2 | C. Lv, J. Zhang, Z. Sun and G. Qian, "Information Flow Security Models for Cloud Computing," Computers, Materials & Continua, vol. 65, no. 3, pp. 2687-2705, 2020. DOI |
3 | G. Yang, M. Yang, S. Salam and J. Zeng, "Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data," Journal of Cyber Security, vol. 1, no. 1, pp, 19-28, 2019. |
4 | Z. Y. Wei, M. D. Wu, N. Ma, M. Lei and W. Bi, "Vulnerability Risk Assessment of IoT System Based on Game Model," Journal of Information Security Research, vol. 4, pp. 48-55, 2018. |
5 | W. Fang, F. Zhang, Y. Ding and J. Sheng, "A New Sequential Image Prediction Method Based on LSTM andDCGAN," Computers, Materials & Continua, vol. 64, no. 1, pp. 217-231, 2020. DOI |
6 | G. J. Fan and L. L. Yang, "Coverage Holes Discovery Algorithm without Location Information in Wireless Sensor Networks," Application Research of Computers, vol. 6, pp. 1826-1829, 2018. |
7 | W. G. Wu, J. L. Yang, and J. Geng, "Risk Assessment of Central Hospital Information System Vulnerabilities Based on WOA-KELM," Information Technology, vol. 43(4), pp. 96-100, 2019. |
8 | W. Fang, L. Pang and W. N. Yi, "Survey on the Application of Deep Reinforcement Learning in Image Processing," Journal on Artificial Intelligence, vol. 2, no. 1, pp. 39-58, 2020. DOI |
9 | Y. H. Liu, X. L. Gao, M. C. Zhu and P. H. Su, "Research on Classification Method of Network Security Data Based on Data Feature Learning," Netinfo Security, vol. 19(10), pp. 50-56, 2019. |
10 | B. Y. Zhang and M. Wang, "Research on Quantization Method of Network Attack and Defense Based on CVSS Vulnerability Score," Journal of Ordnance Equipment Engineering, vol. 4, pp. 147-150, 2018. |
11 | J. Li, P. F. Cao and Yang Jun, "Research on NoC static vulnerability detection system based on big data technology," Modern Electronics Technique, vol. 42(21), pp. 77-81, 2019. |
12 | X. X. Ren, J. Chen, C. Y. Li, Y. X. Yang, "Hazard Assessment of IoT Vulnerabilities Correlation Based on Risk Matrix," Netinfo Security, vol. 11, pp. 86-93, 2018. |
13 | Y. Xiao, "research on network data security check based on a novel feature transformation algorithm," Bulletin of Science and Technology, vol. 35(5), pp. 127-131, 2019. |
14 | M. Fang, "Instantiated Computer Network Threat Risk Assessment Model for UML Model," Communications Technology, vol. 5, pp. 1234-1241, 2019. |
15 | F. Wang, L. Hong, X. Gu, "Risk Assessment Algorithm of Software Vulnerability Based on Sigmoid Function," Journal of Information Security Research, vol. 11, pp. 993-996, 2018. |
16 | G. C. Qian, Q. Ding and S. J. Zhang, "Research on Information Security Vulnerability Awareness and Early Warning Technology," Techniques of Automation and Applications, vol. 2, pp. 51-55, 2018. |
17 | W. Han, Z. Tian, Z. Huang, L. Zhong and Y. Jia, "System Architecture and Key technologies of network security situation awareness system yhsas," Computers, Materials & Continua, vol. 59, no. 1, pp. 167-180, 2019. DOI |
18 | F. Zhao, "Research on Network Security Trend Perception In One-Way Transmission Process of Information," Computer Simulation, vol. 6, pp. 456-460, 2018. |
19 | Y. Y. Feng, "Network Information Encryption Vulnerability Detection System Based on Artificial Fish Swarm Algorithm," Information & Communications, vol. 12, pp. 53-57, 2019. |
20 | S. L. Ma, "Simulation Research on Real Time Detection of Network Information Encryption Vulnerability," Computer Simulation, vol. 3, pp. 328-331, 2018. |
![]() |