23
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Design of network information visualization security cognition system based on QSOFM network and FR algorithm

ORCID Icon
Pages 146-162 | Received 21 Feb 2023, Accepted 05 Aug 2023, Published online: 13 Aug 2023

References

  • Freitag M, Westner P, Schiller C, et al. Agile product-service design with VR-technology: a use case in the furniture industry. Procedia CIRP. 2018;73:114–119. doi: 10.1016/j.procir.2018.03.305
  • Zuo W. Design and implementation of digital art teaching system based on interactive virtual reality. IPPTA: Q J Indian Pulp Pap Tech Assoc. 2018;30(7):587–594.
  • Mao C, Tseng Y, Chen C. Dynamic information visualization on cognitive ability for intelligence preparation of the battlefield. Proceedings of the 6th International Conference on Information and Education Technology. 2018;2(12):263–266. doi: 10.1145/3178158.3178194
  • Chiang PY, Chang HY, Chang YJ. Pottery go: a virtual pottery making training system. IEEE Comput Graph Appl. 2018;38(2):74–88. doi: 10.1109/MCG.2018.021951634
  • Cccr A, Powell RK, Aed C, et al. Examining nursing home information technology maturity and antibiotic use among long-term care residents. J Am Med Dir Assoc. 2022;23(6):1019–1024. doi: 10.1016/j.jamda.2022.01.052
  • Li Z, Liu H, Wu C. Computer network security evaluation method based on improved attack graph. J Cyber Secur Technol. 2022;6(4):201–215. doi: 10.1080/23742917.2022.2120293
  • Olga Greuter K, Sarmah DK. The baseline of global consumer cyber security standards for IoT: quality evaluation. J Cyber Secur Technol. 2022;6(4):175–200. doi: 10.1080/23742917.2022.2105192
  • Gao L, Zhang L, Lin F, et al. Secure frid authentication schemes based on security analysis and improvements of the USI protocol. IEEE Access. 2019;7:8376–8384. doi: 10.1109/ACCESS.2018.2890282
  • Ji X, Shen HW, Ritter A, et al. Visual exploration of neural document embedding in information retrieval: semantics and feature selection. Zisualization Comput Graphics, IEEE Trans On. 2019;25(6):2181–2192. doi: 10.1109/TVCG.2019.2903946
  • Róewski P, Prys M. How to visualize the competence: the Issue of. Occup Inf Network Visualization. 2021;152:4845–4852. doi: 10.1016/j.procs.2021.09.263
  • Yang J, Wu F, Lai E, et al. Analysis of visualization technology of 3D spatial geographic information system. Mob Inform Syst. 2021;2021(2):1–9. doi: 10.1155/2021/9173281
  • Shibata M, Takahashi M. A study on technology visualization analysis method using patent classifier. Electron Comm Jpn. 2020;104(1):103–112. doi: 10.1002/ecj.12295
  • Luic L, Svelec-Juricic D, Misevic P. The impact of knowledge of the issue of identification and authentication on the information security of adolescents in the virtual space. WSEAS Trans Syst Control. 2021;16:527–533. arXiv e-prints, 2021. doi: 10.37394/23203.2021.16.49
  • Zhu A, Yang X, Cui D. Using CiteSpace knowledge information visualization software in the visual analysis of the law research: set juvenile sexual assault as an example. IOP Conf Series: Earth And Environ Sci. 2021;742(1):012008(4pp). doi: 10.1088/1755-1315/742/1/012008
  • Wilson D, Materón EM, Ibáez-Redín G, et al. Faria.Electrical detection of pathogenic bacteria in food samples using information visualization methods with a sensor based on magnetic nanoparticles functionalized with antimicrobial peptides. Talanta. 2019;194:611–618. doi: 10.1016/j.talanta.2018.10.089
  • K C-H, C Y-C, Nguyen DL. Predicting aspect-based sentiment using deep learning and information visualization: the impact of COVID-19 on the airline industry. Inf Manage. 2022;59(2):103587.1–.103587.18. doi: 10.1016/j.im.2021.103587
  • Soares JC, Soares AC, Rodrigues VC, et al. Detection of a SARS-CoV-2 sequence with genosensors using data analysis based on information visualization and machine learning techniques. Mater Chem Front. 2021;5(15):5658–5670. doi: 10.1039/D1QM00665G
  • SIKOS TT, MEIRMANOVA A Meirmanova A. GEO-BASED VISUAL NETWORK ANALYSIS OF EXPORT AND IMPORT PATTERNS IN INTERNATIONAL WHEAT TRADE. Geographia Technica. 2020;15(2):84–92. doi: 10.21163/GT_2020.152.09
  • Guo Q, Gao C, Hao M, et al. Develop Visualization Technology of Cyberspace to Support Construction of Comprehensive Prevention and Control System of Cyber Security. Bulletin of Chinese Academy of Sciences. 2020;35(7):917–924. doi: 10.16418/j.issn.1000-3045.20200302004
  • Procter S. Architecture-level security concerns in a safety critical system. ACM SIGAda Ada Letters. 2020;39(1):50–62. doi: 10.1145/3379106.3379112
  • Yang P, Wang D, Wei Z, et al. An outlier detection approach based on improved self-organizing feature map clustering algorithm. IEEE Access. 2019;7:115914–115925. doi: 10.1109/ACCESS.2019.2922004
  • Qian Y, Xiang X. Binary neural networks for speech recognition. Front Inf Technol Electron Eng. 2019;20(5):701–715. doi: 10.1631/FITEE.1800469
  • Guo Q, Gao C, Hao M, et al. Develop visualization technology of cyberspace to support construction of comprehensive prevention and control system of cyber security. Bull Chin Acad Sci. 2020;35(7):917–924.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.