References
- Wen M, Wenwei S, Zhenwei G. Research on the layered network architecture of DCOS based on cloud services. Foreign Electron Meas Technol. 2020;39(2):83–87.
- Jianan Z. Users’ sensitive information hiding method in hierarchical heterogeneous network based on mobile switching authentication. Comput Sci. 2019;46(3):217–220.
- Mary N, Khan B, Asiri AA, et al. Heart disease risk prediction expending of classification algorithms. Comput Mater Continua. 2022;73(3):6595–6616. doi:10.32604/cmc.2022.032384
- Hou P, Yang G, Hu J, et al. A distributed transactive energy mechanism for integrating PV and storage prosumers in market operation. Engineering. 2022;12(5):171–182. doi: 10.1016/j.eng.2022.03.001
- Husák M, Komárková J, Bou-Harb E, Elias Bou-Harb, Pavel Čeleda. Survey of attack projection, prediction, and forecasting in cyber security. IEEE Commun Surv Tutorials. 2019;21(1):640–660. doi: 10.1109/COMST.2018.2871866
- Li Y, Huang G, Wang C, et al. Analysis framework of network security situational awareness and comparison of implementation methods. J Wireless Communicat Netw. 2019;19(1):1–32. doi: 10.1186/s13638-019-1506-1
- Li L, Jianhua F, Yongyang H, et al. Hierarchical architecture and security protocol for military ad hoc network. Comput Eng. 2019;45(6):188–192+198.
- Yao L, Taihua Z, Erbao HE. Probabilistic routing-based data fusion method in multi-source and multi-sink WSNs. Transd Microsyst Technol. 2019;38(7):53–56.
- Jianghui F. Security and privacy data fusion method for social network based on cloud computing. J Univ Jinan Sci Technol. 2021;35(1):29–33.
- Xu E, Lu W, Liu Y, et al. Research on data fusion algorithm and application based on Kalman filter. Comput Technol Dev. 2020;30(5):143–147.
- Qucheng C, Qingkui C. Deep neural network layering strategy for embedded devices. J Chin Comput Syst. 2019;40(7):1455–1461.
- Cinque M, Della Corte R, Pecchia A. Contextual filtering and prioritization of computer application logs for security situational awareness. Future Gener Comput Syst. 2020;111:668–680. doi: 10.1016/j.future.2019.09.005
- Min C, NiuDou. An improved extended Kalman algorithm for pseudo code tracking optimization simulation. Comput Simul. 2019;36(8):258–261.
- Ding H, Xu H, Duan R, et al. Network security situation awareness model based on Bayesian method. Comput Eng. 2020;46(6):130–135.
- Kou G, Wang S, Tang G. Research on key technologies of network security situational awareness for attack tracking prediction. Chin J Electron. 2019;28(1):162–171. doi: 10.1049/cje.2018.10.007
- Ogburn EL, Rudolph KE, MorelloFrosch R, et al. Response to “estimation and bounds under data fusion”. Am J Epidemiol. 2021;16(5):329–336.
- Zhao Z, Peng Y, Huang J, et al. An evaluation method of network security situation using data fusion theory. Int J Performability Eng. 2020;16(7):1046–1052. doi: 10.23940/ijpe.20.07.p7.10461057
- Azcarate SM, Ríos Reina R, Amigo JM, et al. Data handling in data fusion: methodologies and applications. Trends Anal Chem. 2021;143(7):116355–116367. doi: 10.1016/j.trac.2021.116355
- George PG, Renjith VR. Evolution of safety and security risk assessment methodologies towards the use of bayesian networks in process industries. Process Saf Environ Prot. 2021;149:758–775. doi: 10.1016/j.psep.2021.03.031
- Guo H, Huang S, Huang C, et al. File entropy signal analysis combined with wavelet decomposition for malware classification. IEEE Access. 2020;8:158961–158971. doi: 10.1109/ACCESS.2020.3020330
- Wang X, Han Z, Yu R. Security situation prediction method of industrial control network based on ant colony-RBF neural network. 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE); IEEE; 2021. p. 834–837.
- Peng M, Li Z, Juan X. Similarity-based domain adaptation network. Neurocomputing. 2022;493(Jul.7):462–473. doi: 10.1016/j.neucom.2021.12.089
- Saleem N, Gao J, Khattak MI, et al. DeepResGRU: residual gated recurrent neural network-augmented Kalman filtering for speech enhancement and recognition. Knowledge-Based Syst. 2022;238(Feb.28):107914.1–.107914.13. doi: 10.1016/j.knosys.2021.107914
- Jain AK, Sahoo SR, Kaubiyal J. Online social networks security and privacy: comprehensive review and analysis. Complex Intell Syst. 2021;7(5):2157–2177. doi: 10.1007/s40747-021-00409-7
- El Alaoui I, Gahi Y. Network security strategies in big data context. Procedia Comput Sci. 2020;175:730–736. doi: 10.1016/j.procs.2020.07.108