2020
DOI: 10.1016/j.comcom.2020.01.045
|View full text |Cite
|
Sign up to set email alerts
|

Security monitoring of heterogeneous networks for big data based on distributed association algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Next is the FTP protocol [20]. FTP has no limitation on file size and is relatively simple to operate.…”
Section: Analysis Of Advantages and Disadvantages Of Http And Ftp Tra...mentioning
confidence: 99%
“…Next is the FTP protocol [20]. FTP has no limitation on file size and is relatively simple to operate.…”
Section: Analysis Of Advantages and Disadvantages Of Http And Ftp Tra...mentioning
confidence: 99%
“…In 2020, Wei Hu et al [2], developed a distributed analysis model that has a lot of possible benefits. In the alarm database, the main important feature was the vital decrease in the candidate set that be able to an immense amount help to develop the competence of alarm correlation algorithm in heterogeneous networks, thus additional minimizing the time needed for alarm correlation algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…WiMAX presents WIA to the subsequently level, and more than time, might attain alike rates to devices as WiFi [2]. WiMAX able to transport Internet access miles from the blanket large areas and the nearest WiFi hotspot named WANs, suburban, metropolitan, else rural using multi-megabit per Internet access and second mobile broadband [17].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is necessary to build a mathematical model to mine the potential relationship information between these data, such as location-based Social Network (LBSN), which generally contains two kinds of data [12]: One is the data of users themselves in the network, and the other is the relational data existing between users. The temporal and spatial information between users can be mined from LBSN for various application activities [6], such as friend recommendation [8], interest recommendation [2], trajectory recovery [14], behavior prediction [15] and other application scenarios. In fact, in the analysis of social networks, link prediction has always been a research focus of information recommendation system, which is to find out the information that may exist node link from the known node information in the network.…”
Section: Introductionmentioning
confidence: 99%