Optimization Application of Dynamic Programming Algorithm in Computer Security Management
Saved in:
| Published in: | Procedia computer science Vol. 261; pp. 494 - 503 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
2025
|
| ISSN: | 1877-0509, 1877-0509 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Author | Li, Ying |
|---|---|
| Author_xml | – sequence: 1 givenname: Ying surname: Li fullname: Li, Ying |
| BookMark | eNpNkL1OwzAcxC1UJErpE7D4BRJs_-3EGavyUaSiIgEDk-W4TnBV25GTDuXpSSkDt9zpTrrhd40mIQaL0C0lOSW0uNvlXYqmzxlhIic8ZyAv0JTKssyIINXkX75C877fkVEgZUXLKfrcdIPz7lsPLga86Lq9M-ccG3x_DNo7g19TbJP23oUWL_ZtTG748tgFvIy-Oww24TdrDmN7xC866NZ6G4YbdNnofW_nfz5DH48P78tVtt48PS8X68zQgsqMSkEkCM0asFyUmpnGbqHmYEE0AoQlphbluNSCA2c1NLzQVbFlvIZqWxKYITj_mhT7PtlGdcl5nY6KEnUCpHbqF5A6AVKEqxEQ_ADYhV2g |
| Cites_doi | 10.1108/TQM-09-2020-0202 10.1016/j.dcan.2021.07.006 10.4236/jis.2022.134016 10.1007/s12652-020-02601-y 10.3390/computers10080102 10.1080/0960085X.2022.2096491 10.1016/j.comcom.2021.11.014 10.1109/MNET.104.2100495 10.1016/j.procs.2022.10.079 10.1007/s00500-022-06813-6 10.1007/s11831-020-09478-2 10.35467/cal/157121 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.procs.2025.04.238 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1877-0509 |
| EndPage | 503 |
| ExternalDocumentID | 10_1016_j_procs_2025_04_238 |
| GroupedDBID | --K 0R~ 1B1 457 5VS 71M 9DU AAEDT AAEDW AAIKJ AALRI AAQFI AAXUO AAYWO AAYXX ABMAC ABWVN ACGFS ACRPL ACVFH ADBBV ADCNI ADEZE ADNMO ADVLN AEUPX AEXQZ AFPUW AFTJW AGHFR AIGII AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ CITATION E3Z EBS EJD EP3 FDB FNPLU HZ~ IXB KQ8 M41 M~E O-L O9- OK1 P2P ROL SES SSZ ~HD |
| ID | FETCH-LOGICAL-c1618-1850835a2f3e457a2cfed3b43e35f535e0cb57457b54342b3f46a96d24b39d703 |
| ISSN | 1877-0509 |
| IngestDate | Sat Nov 29 07:52:02 EST 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c1618-1850835a2f3e457a2cfed3b43e35f535e0cb57457b54342b3f46a96d24b39d703 |
| OpenAccessLink | https://doi.org/10.1016/j.procs.2025.04.238 |
| PageCount | 10 |
| ParticipantIDs | crossref_primary_10_1016_j_procs_2025_04_238 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-00-00 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – year: 2025 text: 2025-00-00 |
| PublicationDecade | 2020 |
| PublicationTitle | Procedia computer science |
| PublicationYear | 2025 |
| References | Kostrubiec (10.1016/j.procs.2025.04.238_bib11) 2022; 8 Sun (10.1016/j.procs.2025.04.238_bib4) 2022; 208 Yungaicela-Naula (10.1016/j.procs.2025.04.238_bib9) 2022; 183 Villegas-Ch (10.1016/j.procs.2025.04.238_bib6) 2021; 10 Qiang (10.1016/j.procs.2025.04.238_bib1) 2022; 26 Geetha (10.1016/j.procs.2025.04.238_bib10) 2021; 28 El Jaouhari (10.1016/j.procs.2025.04.238_bib7) 2021; 12 Benzaid (10.1016/j.procs.2025.04.238_bib5) 2022; 36 Guangxu (10.1016/j.procs.2025.04.238_bib12) 2021; 40 Zheng (10.1016/j.procs.2025.04.238_bib8) 2022; 8 Culot (10.1016/j.procs.2025.04.238_bib2) 2021; 33 Fauziyah (10.1016/j.procs.2025.04.238_bib3) 2022; 13 Ghahramani (10.1016/j.procs.2025.04.238_bib13) 2023; 32 |
| References_xml | – volume: 33 start-page: 76 issue: 7 year: 2021 ident: 10.1016/j.procs.2025.04.238_bib2 article-title: The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda[J] publication-title: The TQM Journal doi: 10.1108/TQM-09-2020-0202 – volume: 8 start-page: 422 issue: 4 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib8 article-title: Dynamic defenses in cyber security: Techniques, methods and challenges[J] publication-title: Digital Communications and Networks doi: 10.1016/j.dcan.2021.07.006 – volume: 40 start-page: 6889 issue: 4 year: 2021 ident: 10.1016/j.procs.2025.04.238_bib12 article-title: Research on computer network information security based on improved machine learning[J] publication-title: Journal of Intelligent & Fuzzy Systems – volume: 13 start-page: 294 issue: 4 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib3 article-title: Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)[J] publication-title: Journal of Information Security doi: 10.4236/jis.2022.134016 – volume: 12 start-page: 9081 issue: 10 year: 2021 ident: 10.1016/j.procs.2025.04.238_bib7 article-title: SDN-based security management of multiple WoT smart spaces[J] publication-title: Journal of Ambient Intelligence and Humanized Computing doi: 10.1007/s12652-020-02601-y – volume: 10 start-page: 102 issue: 8 year: 2021 ident: 10.1016/j.procs.2025.04.238_bib6 article-title: Proposal for an implementation guide for a computer security incident response team on a university campus[J] publication-title: Computers doi: 10.3390/computers10080102 – volume: 32 start-page: 1011 issue: 6 year: 2023 ident: 10.1016/j.procs.2025.04.238_bib13 article-title: Continuous improvement of information security management: an organisational learning perspective[J] publication-title: European Journal of Information Systems doi: 10.1080/0960085X.2022.2096491 – volume: 183 start-page: 64 issue: 1 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib9 article-title: Towards security automation in software defined networks[J] publication-title: Computer Communications doi: 10.1016/j.comcom.2021.11.014 – volume: 36 start-page: 165 issue: 6 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib5 article-title: Ai-based autonomic and scalable security management architecture for secure network slicing in b5g[J] publication-title: IEEE Network doi: 10.1109/MNET.104.2100495 – volume: 208 start-page: 570 issue: 1 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib4 article-title: Computer network security technology and prevention strategy analysis[J] publication-title: Procedia Computer Science doi: 10.1016/j.procs.2022.10.079 – volume: 26 start-page: 7871 issue: 16 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib1 article-title: Computer application under the management of network information security technology using genetic algorithm[J] publication-title: Soft Computing doi: 10.1007/s00500-022-06813-6 – volume: 28 start-page: 2861 issue: 4 year: 2021 ident: 10.1016/j.procs.2025.04.238_bib10 article-title: A review on the effectiveness of machine learning and deep learning algorithms for cyber security[J] publication-title: Archives of Computational Methods in Engineering doi: 10.1007/s11831-020-09478-2 – volume: 8 start-page: 27 issue: 2 year: 2022 ident: 10.1016/j.procs.2025.04.238_bib11 article-title: The position of the Computer Security Incidents Response Teams in the national cybersecurity system[J] publication-title: Cybersecurity and Law doi: 10.35467/cal/157121 |
| SSID | ssj0000388917 |
| Score | 2.3427696 |
| SourceID | crossref |
| SourceType | Index Database |
| StartPage | 494 |
| Title | Optimization Application of Dynamic Programming Algorithm in Computer Security Management |
| Volume | 261 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1877-0509 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000388917 issn: 1877-0509 databaseCode: M~E dateStart: 20100101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV25TsNAEF1xFTTciFtbUGKJ7GFnS8QhCq4CpKSyst5dSEQclASUim9n9rBjEoRIQWM5a2dk-1kz49GbNwgdMwgzsqZqkaybxFarwA_GREUxlfA9wYVmyknm3yR3d_VGQzyEYZwDN04gyfP6aCTe_hVqWAOwbevsDHCXRmEB9gF02ALssP0T8PfgBLqhu9InmVmZFl74-fO2PcCysrquJvL63Ou3hy9d3wDohzyEOjxk6BP8mJDHuv4CeLUcJd39IYTSkuDjWALNIjCGuoLvPg5OsJ4kkdWF8THih7XgOYnXUQ--j_lpxSGMciddMO2hfbGgY-NDZuXSCbdSs8RLvHzXw56IUyV7sCCmdVJnJLVG0lOWgpF5tEgSLiy37_ZzXGyzkjfCTV8u76NQoHJcv6mLqWQplXTjcQ2thO8EfObxXUdzOt9AqwU8OLjkTdSswo0rcOOewQFuXIEbl3Djdo7H9gLceAz3Fnq6unw8v47CuIwos1MPIsi8bD7dIoZqxpMWyYxWVDKqKTeccn2aSZ7AEWnbiYmkhsUtESvCJBUKPP82Wsh7ud5BWMoWi2MhaaxqTGkjhFHEMCa1gHSP0110UjwewMCpoqS_oLI32-n7aNn-8oWuA7Qw7L_rQ7SUfQzbg_6RQ_YLjNxeYw |
| linkProvider | ISSN International Centre |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimization+Application+of+Dynamic+Programming+Algorithm+in+Computer+Security+Management&rft.jtitle=Procedia+computer+science&rft.au=Li%2C+Ying&rft.date=2025&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=261&rft.spage=494&rft.epage=503&rft_id=info:doi/10.1016%2Fj.procs.2025.04.238&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2025_04_238 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon |