References
- W. G. Wu, J. L. Yang, and J. Geng, "Risk Assessment of Central Hospital Information System Vulnerabilities Based on WOA-KELM," Information Technology, vol. 43(4), pp. 96-100, 2019.
- W. Han, Z. Tian, Z. Huang, L. Zhong and Y. Jia, "System Architecture and Key technologies of network security situation awareness system yhsas," Computers, Materials & Continua, vol. 59, no. 1, pp. 167-180, 2019. https://doi.org/10.32604/cmc.2019.05192
- K. N. Lei, Y. Q. Zhang, C. S. Wu and H. Ma, "A System for Scoring the Exploitability of Vulnerability Based Types," Journal of Computer Research and Development, vol. 54, no. 10, pp. 2296-2309, 2017.
- C. Lv, J. Zhang, Z. Sun and G. Qian, "Information Flow Security Models for Cloud Computing," Computers, Materials & Continua, vol. 65, no. 3, pp. 2687-2705, 2020. https://doi.org/10.32604/cmc.2020.011232
- F. Zhao, "Research on Network Security Trend Perception In One-Way Transmission Process of Information," Computer Simulation, vol. 6, pp. 456-460, 2018.
- G. Yang, M. Yang, S. Salam and J. Zeng, "Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data," Journal of Cyber Security, vol. 1, no. 1, pp, 19-28, 2019.
- Z. Y. Wei, M. D. Wu, N. Ma, M. Lei and W. Bi, "Vulnerability Risk Assessment of IoT System Based on Game Model," Journal of Information Security Research, vol. 4, pp. 48-55, 2018.
- W. Fang, F. Zhang, Y. Ding and J. Sheng, "A New Sequential Image Prediction Method Based on LSTM andDCGAN," Computers, Materials & Continua, vol. 64, no. 1, pp. 217-231, 2020. https://doi.org/10.32604/cmc.2020.06395
- X. X. Ren, J. Chen, C. Y. Li, Y. X. Yang, "Hazard Assessment of IoT Vulnerabilities Correlation Based on Risk Matrix," Netinfo Security, vol. 11, pp. 86-93, 2018.
- W. Fang, L. Pang and W. N. Yi, "Survey on the Application of Deep Reinforcement Learning in Image Processing," Journal on Artificial Intelligence, vol. 2, no. 1, pp. 39-58, 2020. https://doi.org/10.32604/jai.2020.09789
- Y. H. Liu, X. L. Gao, M. C. Zhu and P. H. Su, "Research on Classification Method of Network Security Data Based on Data Feature Learning," Netinfo Security, vol. 19(10), pp. 50-56, 2019.
- B. Y. Zhang and M. Wang, "Research on Quantization Method of Network Attack and Defense Based on CVSS Vulnerability Score," Journal of Ordnance Equipment Engineering, vol. 4, pp. 147-150, 2018.
- Y. Y. Feng, "Network Information Encryption Vulnerability Detection System Based on Artificial Fish Swarm Algorithm," Information & Communications, vol. 12, pp. 53-57, 2019.
- G. J. Fan and L. L. Yang, "Coverage Holes Discovery Algorithm without Location Information in Wireless Sensor Networks," Application Research of Computers, vol. 6, pp. 1826-1829, 2018.
- G. C. Qian, Q. Ding and S. J. Zhang, "Research on Information Security Vulnerability Awareness and Early Warning Technology," Techniques of Automation and Applications, vol. 2, pp. 51-55, 2018.
- S. L. Ma, "Simulation Research on Real Time Detection of Network Information Encryption Vulnerability," Computer Simulation, vol. 3, pp. 328-331, 2018.
- Y. Xiao, "research on network data security check based on a novel feature transformation algorithm," Bulletin of Science and Technology, vol. 35(5), pp. 127-131, 2019.
- M. Fang, "Instantiated Computer Network Threat Risk Assessment Model for UML Model," Communications Technology, vol. 5, pp. 1234-1241, 2019.
- J. Li, P. F. Cao and Yang Jun, "Research on NoC static vulnerability detection system based on big data technology," Modern Electronics Technique, vol. 42(21), pp. 77-81, 2019.
- F. Wang, L. Hong, X. Gu, "Risk Assessment Algorithm of Software Vulnerability Based on Sigmoid Function," Journal of Information Security Research, vol. 11, pp. 993-996, 2018.