Description |
1 online resource (840 pages) |
Series |
Advances in Intelligent Systems and Computing ; v. 1146 |
|
Advances in intelligent systems and computing ; 1146.
|
Contents |
Intro -- Foreword -- Organization -- Steering Committee Chair -- General Chair -- Program Committee Chairs -- Publication Chairs -- Publicity Chairs -- Local Organizing Chairs -- Program Committee Members -- Contents -- Technical Tracks 1: Cyber Intelligence and Analytics from Different Layers of Network Space Solutions -- Computer Network Information Security Protection Strategy Based on Clustering Algorithms -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Troubles in Computer Network Information Security -- 2.2 Cluster Analysis Technology -- 2.3 Improved K-Means Clustering Algorithms |
|
3 Experimental Simulation and Experimental Data -- 4 Experiments and Discussions -- 4.1 Experimental Process -- 4.2 Experimental Summary -- 5 Conclusion -- References -- Network Communication Security Program Design Based on Wireless Router -- Abstract -- 1 Introduction -- 2 TCM Module Platform Structure -- 2.1 Trusted Cryptographic Module -- 2.2 Trusted Cryptographic Service Module (TSM) -- 3 TCM Certification Based on 802.1X -- 4 System Test -- 4.1 Test Process -- 4.2 Test Result Analysis -- 5 Conclusion -- References |
|
Network Intrusion Detection Model Based on Improved Convolutional Neural Network -- Abstract -- 1 Introduction -- 2 Convolution Neural Network Based on Genetic Algorithm -- 3 Intrusion Detection Experiment Based on Genetic Convolution Neural Network -- 3.1 Chromosome Coding and Fitness Function -- 3.2 Experimental Model Settings -- 3.3 Comparison Experiment Settings -- 3.4 Experimental Results and Analysis -- 4 Conclusion -- References -- Overall Layout and Security Measures of Campus Wireless Local Area Networks -- Abstract -- 1 Introduction -- 2 Methods and Techniques |
|
2.1 Demand of Campus Network -- 2.2 Network Structure and Engineering Wiring (Fig. 1) -- 2.3 Business Deployment of the Campus Wireless Network (Fig. 2) -- 2.4 Management Mode of Campus Wireless Network (Fig. 3) -- 3 Security of Campus WLAN -- 3.1 Common Security Risks of Campus Wireless Network -- 3.1.1 DSSS Risks -- 3.1.2 WEP Security Vulnerability -- 3.1.3 Hardware Stolen -- 3.1.4 Fake Access Point -- 3.1.5 Other Hidden Dangers -- 3.2 Prevention Strategies -- 3.2.1 WLAN Authentication -- 3.2.2 Reasonable Installation of Wireless Network Equipment |
|
3.2.3 Using Static IP Address and Intrusion Detection Tool -- 3.2.4 Set up Additional Third-Party Data Encryption Scheme -- 4 Summary and Prospect -- References -- Application of Computer Network Anomaly Recognition Based on Artificial Intelligence -- Abstract -- 1 Introduction -- 2 Current Status of Artificial Intelligence in Network Anomaly Diagnostic Applications -- 3 Network Management Based on Artificial Intelligence -- 4 Analysis of Basic Characteristics of Network Anomaly -- 4.1 Hierarchy -- 4.2 Transmissibility -- 4.3 Correlation -- 4.4 Randomness |
Summary |
This book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly those focusing on threat intelligence, analytics, and preventing cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods, and applications concerning all aspects of cyber security intelligence and analytics. CSIA 2020, which was held in Haikou, China on February 28-29, 2020, built on the previous conference in Wuhu, China (2019), and marks the series second successful installment |
Notes |
5 Application of Network Anomaly Recognition Method Based on Artificial Intelligence |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Security measures
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Xu, Zheng
|
|
Parizi, Reza M
|
|
Hammoudeh, Mohammad
|
|
Loyola-González, Octavio
|
ISBN |
9783030433062 |
|
3030433064 |
|