Analysis on abnormal behavior of insider threats based on accesslog mining

W Peichao, Z Yun, Z Cheng, H Jincai… - CAAI Trans. Intell …, 2017 - tis.hrbeu.edu.cn
… To address this challenge, this paper proposes a method for analyzing the abnormal behavior
of insider threats based on accesslog data mining. First, the PrefixSpan algorithm is used …

[引用][C] Development and outlook of China􀆳 s pipeline transportation technologies under energy security strategy

D Jianlin, X Xin, Z Duihong - Oil & Gas Storage and Transportation, 2022

[PDF][PDF] “Cultural war” in a globalized East: How Taiwanese conservative christianity turned public during the same-sex marriage controversy and a secularist backlash

K Huang - Review of Religion and Chinese Society, 2017 - academia.edu
An astonishingly large Christian coalition has emerged to protest the legalization of same-sex
marriage in Taiwan, an alleged beacon for the promotion of gay rights in Asia. This article …

[PDF][PDF] The Adaptive Strategies Improving TS Design in Internet of Things 器劃

S Kallam, A Veerender, K Shilpa, KR Reddy - researchgate.net
Issues like lack of privacy and security need to be controlled to ensure societal … issues that
come with IOT and a lot more is still needs to be researched in more details. There are issues

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… The security issues are explained in Section 4. The different security issues address in
IoT … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …

基于栈式降噪自编码器降维的物联网分层入侵检测模型

宋永强 - 2018 - ir.lzu.edu.cn
security in the Internet of Things is getting more and more attention. The security problem
in the Internet of Things is more serious than the traditional network security problems. It will …

基于区块链的物联网安全机制研究

周才博 - 2021 - ir.lzu.edu.cn
… for the Internet of Things. The bringing of blockchain technology provides new solutions to
common security problems in the Internet of Things. Combining the security features of IoT …

[PDF][PDF] Addressing Security and Computation TS Challenges in IoT Using Machine 醫官Learning

BK Mohanta, U Satapathy, D Jena - researchgate.net
… In this paper, the authors have identified security challenges and their corresponding …
Finally, the paper explained that machine learning can address some of the security challenges

物联网场景下基于属性基加密机制的效率与安全研究

于浩泽 - 2021 - ir.lzu.edu.cn
security issues in IoT scenarios have gradually emerged.Although the Internet of Things
scenario is an extension of the Internet … the Internet system: it is mainly manifested in a series of …

SM9 在泛在物联网中的应用研究.

边杏宾, 马俊明, 胡志勇… - … Security/Xinxi Jishu yu …, 2022 - search.ebscohost.com
… the lightweight security scheme of ubiquitous Internet of Things, designs the SM9 secret key
infrastructure, analyzes the sysr tem implementation ways, and solves the security problems