2019
DOI: 10.1016/j.ssci.2019.04.007
|View full text |Cite
|
Sign up to set email alerts
|

Sensor network security defense strategy based on attack graph and improved binary PSO

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…Dilated convolution takes interval sampling in each layer for convolution sampling. e size of the interval is determined by the dilation factor d, as shown in Figure 3, where the kernel size is 2 and dilations are [1,2,4]. e size of each layer d of the dilated convolution grows exponentially, where the first layer is 1 (1 means the interval is 0).…”
Section: Dilated Convolutionmentioning
confidence: 99%
See 1 more Smart Citation
“…Dilated convolution takes interval sampling in each layer for convolution sampling. e size of the interval is determined by the dilation factor d, as shown in Figure 3, where the kernel size is 2 and dilations are [1,2,4]. e size of each layer d of the dilated convolution grows exponentially, where the first layer is 1 (1 means the interval is 0).…”
Section: Dilated Convolutionmentioning
confidence: 99%
“…ere are many methods for network security situation prediction. e main research focuses on two aspects based on time-series prediction [3] and graph theory-based prediction [4].…”
Section: Introductionmentioning
confidence: 99%
“…In fact, it assumes that the particles have fallen into the local optimum when the gbest values are unchanged after three generations. The particles have to be induced to leave the local optimum using the 'and logical operation' 'and' pbest of all particles [163,164].…”
Section: Eai Endorsed Transactions On Security and Safetymentioning
confidence: 99%
“…These four gates are used to retain the error gradient through some limited algorithms. LSTM needs to use formula combination to give the restriction of each door to information transmission 18 …”
Section: Deep Time Series Network Security Situation Predictionmentioning
confidence: 99%