Publisher
Springer International Publishing
Reference10 articles.
1. Geng, Y.L.: Computer network security analysis based on fuzzy analytic hierarchy process. J. Jiamusi Vocat. Inst. (2016)
2. Sabur, A., Chowdhary, A., Huang, D., Alshamrani, A.: Toward scalable graph-based security analysis for cloud networks. Comput. Netw. 206, 108795 (2022)
3. Saha, T., Aaraj, N., Jha, N.K.: Machine learning assisted security analysis of 5G-network-connected systems. (2021)
4. Adeyemo, A., Khalid, F., Odetola, T.A., et al.: Security analysis of capsule network inference using horizontal collaboration (2021)
5. Li, A., Zheng, H.: Energy security and sustainable design of urban systems based on ecological network analysis. Ecol. Indic. 129(11), 107903 (2021)