Author:
Huang Xiuli,Shi Congcong,Guo Qian,Gao Xianzhou,Yu Pengfei
Reference10 articles.
1. Li, Q.M., Zhang, H.: Information security risk assessment technology of cyberspace: a review. Information 15(11), 677–683 (2012)
2. Li, Q.M., Li, J.: Rough outlier detection based security risk analysis methodology. China Commun. 9(7), 14–21 (2012)
3. Li, G.J., Cheng, X,Q.: Research status and scientific thinking of big data. Bull. Chinese Acad. Sci. 27(6), 647–657 (2012)
4. Haque, M.S., Chowdhury, M.U.: A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV). In: Proceedings 13 Security and Privacy in Communication Networks: Secure Comm 2017 International Workshops, ATCS and SePrIoT, pp. 113–122. Springer International Publishing (2018)
5. Li, J., Zhao, G., Chen, X., et al.: Fine-grained data access control systems with user accountability in cloud computing. In: The 2nd International Conference on Cloud Computing Technology and Science, IEEE Computer Society, pp. 89–96 (2010)