36
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Research on hierarchical network security situation awareness data fusion method in big data environment

ORCID Icon, &
Pages 31-52 | Received 14 Oct 2022, Accepted 03 Jun 2023, Published online: 08 Aug 2023

References

  • Wen M, Wenwei S, Zhenwei G. Research on the layered network architecture of DCOS based on cloud services. Foreign Electron Meas Technol. 2020;39(2):83–87.
  • Jianan Z. Users’ sensitive information hiding method in hierarchical heterogeneous network based on mobile switching authentication. Comput Sci. 2019;46(3):217–220.
  • Mary N, Khan B, Asiri AA, et al. Heart disease risk prediction expending of classification algorithms. Comput Mater Continua. 2022;73(3):6595–6616. doi:10.32604/cmc.2022.032384
  • Hou P, Yang G, Hu J, et al. A distributed transactive energy mechanism for integrating PV and storage prosumers in market operation. Engineering. 2022;12(5):171–182. doi: 10.1016/j.eng.2022.03.001
  • Husák M, Komárková J, Bou-Harb E, Elias Bou-Harb, Pavel Čeleda. Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun Surv Tutorials. 2019;21(1):640–660. doi: 10.1109/COMST.2018.2871866
  • Li Y, Huang G, Wang C, et al. Analysis framework of network security situational awareness and comparison of implementation methods. J Wireless Communicat Netw. 2019;19(1):1–32. doi: 10.1186/s13638-019-1506-1
  • Li L, Jianhua F, Yongyang H, et al. Hierarchical architecture and security protocol for military ad hoc network. Comput Eng. 2019;45(6):188–192+198.
  • Yao L, Taihua Z, Erbao HE. Probabilistic routing-based data fusion method in multi-source and multi-sink WSNs. Transd Microsyst Technol. 2019;38(7):53–56.
  • Jianghui F. Security and privacy data fusion method for social network based on cloud computing. J Univ Jinan Sci Technol. 2021;35(1):29–33.
  • Xu E, Lu W, Liu Y, et al. Research on data fusion algorithm and application based on Kalman filter. Comput Technol Dev. 2020;30(5):143–147.
  • Qucheng C, Qingkui C. Deep neural network layering strategy for embedded devices. J Chin Comput Syst. 2019;40(7):1455–1461.
  • Cinque M, Della Corte R, Pecchia A. Contextual filtering and prioritization of computer application logs for security situational awareness. Future Gener Comput Syst. 2020;111:668–680. doi: 10.1016/j.future.2019.09.005
  • Min C, NiuDou. An improved extended Kalman algorithm for pseudo code tracking optimization simulation. Comput Simul. 2019;36(8):258–261.
  • Ding H, Xu H, Duan R, et al. Network security situation awareness model based on Bayesian method. Comput Eng. 2020;46(6):130–135.
  • Kou G, Wang S, Tang G. Research on key technologies of network security situational awareness for attack tracking prediction. Chin J Electron. 2019;28(1):162–171. doi: 10.1049/cje.2018.10.007
  • Ogburn EL, Rudolph KE, MorelloFrosch R, et al. Response to “estimation and bounds under data fusion”. Am J Epidemiol. 2021;16(5):329–336.
  • Zhao Z, Peng Y, Huang J, et al. An evaluation method of network security situation using data fusion theory. Int J Performability Eng. 2020;16(7):1046–1052. doi: 10.23940/ijpe.20.07.p7.10461057
  • Azcarate SM, Ríos Reina R, Amigo JM, et al. Data handling in data fusion: methodologies and applications. Trends Anal Chem. 2021;143(7):116355–116367. doi: 10.1016/j.trac.2021.116355
  • George PG, Renjith VR. Evolution of safety and security risk assessment methodologies towards the use of bayesian networks in process industries. Process Saf Environ Prot. 2021;149:758–775. doi: 10.1016/j.psep.2021.03.031
  • Guo H, Huang S, Huang C, et al. File entropy signal analysis combined with wavelet decomposition for malware classification. IEEE Access. 2020;8:158961–158971. doi: 10.1109/ACCESS.2020.3020330
  • Wang X, Han Z, Yu R. Security situation prediction method of industrial control network based on ant colony-RBF neural network. 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE); IEEE; 2021. p. 834–837.
  • Peng M, Li Z, Juan X. Similarity-based domain adaptation network. Neurocomputing. 2022;493(Jul.7):462–473. doi: 10.1016/j.neucom.2021.12.089
  • Saleem N, Gao J, Khattak MI, et al. DeepResGRU: residual gated recurrent neural network-augmented Kalman filtering for speech enhancement and recognition. Knowledge-Based Syst. 2022;238(Feb.28):107914.1–.107914.13. doi: 10.1016/j.knosys.2021.107914
  • Jain AK, Sahoo SR, Kaubiyal J. Online social networks security and privacy: comprehensive review and analysis. Complex Intell Syst. 2021;7(5):2157–2177. doi: 10.1007/s40747-021-00409-7
  • El Alaoui I, Gahi Y. Network security strategies in big data context. Procedia Comput Sci. 2020;175:730–736. doi: 10.1016/j.procs.2020.07.108

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.