Optimization Application of Dynamic Programming Algorithm in Computer Security Management

Saved in:
Bibliographic Details
Published in:Procedia computer science Vol. 261; pp. 494 - 503
Main Author: Li, Ying
Format: Journal Article
Language:English
Published: 2025
ISSN:1877-0509, 1877-0509
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Author Li, Ying
Author_xml – sequence: 1
  givenname: Ying
  surname: Li
  fullname: Li, Ying
BookMark eNpNkL1OwzAcxC1UJErpE7D4BRJs_-3EGavyUaSiIgEDk-W4TnBV25GTDuXpSSkDt9zpTrrhd40mIQaL0C0lOSW0uNvlXYqmzxlhIic8ZyAv0JTKssyIINXkX75C877fkVEgZUXLKfrcdIPz7lsPLga86Lq9M-ccG3x_DNo7g19TbJP23oUWL_ZtTG748tgFvIy-Oww24TdrDmN7xC866NZ6G4YbdNnofW_nfz5DH48P78tVtt48PS8X68zQgsqMSkEkCM0asFyUmpnGbqHmYEE0AoQlphbluNSCA2c1NLzQVbFlvIZqWxKYITj_mhT7PtlGdcl5nY6KEnUCpHbqF5A6AVKEqxEQ_ADYhV2g
Cites_doi 10.1108/TQM-09-2020-0202
10.1016/j.dcan.2021.07.006
10.4236/jis.2022.134016
10.1007/s12652-020-02601-y
10.3390/computers10080102
10.1080/0960085X.2022.2096491
10.1016/j.comcom.2021.11.014
10.1109/MNET.104.2100495
10.1016/j.procs.2022.10.079
10.1007/s00500-022-06813-6
10.1007/s11831-020-09478-2
10.35467/cal/157121
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.procs.2025.04.238
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1877-0509
EndPage 503
ExternalDocumentID 10_1016_j_procs_2025_04_238
GroupedDBID --K
0R~
1B1
457
5VS
71M
9DU
AAEDT
AAEDW
AAIKJ
AALRI
AAQFI
AAXUO
AAYWO
AAYXX
ABMAC
ABWVN
ACGFS
ACRPL
ACVFH
ADBBV
ADCNI
ADEZE
ADNMO
ADVLN
AEUPX
AEXQZ
AFPUW
AFTJW
AGHFR
AIGII
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
CITATION
E3Z
EBS
EJD
EP3
FDB
FNPLU
HZ~
IXB
KQ8
M41
M~E
O-L
O9-
OK1
P2P
ROL
SES
SSZ
~HD
ID FETCH-LOGICAL-c1618-1850835a2f3e457a2cfed3b43e35f535e0cb57457b54342b3f46a96d24b39d703
ISSN 1877-0509
IngestDate Sat Nov 29 07:52:02 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1618-1850835a2f3e457a2cfed3b43e35f535e0cb57457b54342b3f46a96d24b39d703
OpenAccessLink https://doi.org/10.1016/j.procs.2025.04.238
PageCount 10
ParticipantIDs crossref_primary_10_1016_j_procs_2025_04_238
PublicationCentury 2000
PublicationDate 2025-00-00
PublicationDateYYYYMMDD 2025-01-01
PublicationDate_xml – year: 2025
  text: 2025-00-00
PublicationDecade 2020
PublicationTitle Procedia computer science
PublicationYear 2025
References Kostrubiec (10.1016/j.procs.2025.04.238_bib11) 2022; 8
Sun (10.1016/j.procs.2025.04.238_bib4) 2022; 208
Yungaicela-Naula (10.1016/j.procs.2025.04.238_bib9) 2022; 183
Villegas-Ch (10.1016/j.procs.2025.04.238_bib6) 2021; 10
Qiang (10.1016/j.procs.2025.04.238_bib1) 2022; 26
Geetha (10.1016/j.procs.2025.04.238_bib10) 2021; 28
El Jaouhari (10.1016/j.procs.2025.04.238_bib7) 2021; 12
Benzaid (10.1016/j.procs.2025.04.238_bib5) 2022; 36
Guangxu (10.1016/j.procs.2025.04.238_bib12) 2021; 40
Zheng (10.1016/j.procs.2025.04.238_bib8) 2022; 8
Culot (10.1016/j.procs.2025.04.238_bib2) 2021; 33
Fauziyah (10.1016/j.procs.2025.04.238_bib3) 2022; 13
Ghahramani (10.1016/j.procs.2025.04.238_bib13) 2023; 32
References_xml – volume: 33
  start-page: 76
  issue: 7
  year: 2021
  ident: 10.1016/j.procs.2025.04.238_bib2
  article-title: The ISO/IEC 27001 information security management standard: literature review and theory-based research agenda[J]
  publication-title: The TQM Journal
  doi: 10.1108/TQM-09-2020-0202
– volume: 8
  start-page: 422
  issue: 4
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib8
  article-title: Dynamic defenses in cyber security: Techniques, methods and challenges[J]
  publication-title: Digital Communications and Networks
  doi: 10.1016/j.dcan.2021.07.006
– volume: 40
  start-page: 6889
  issue: 4
  year: 2021
  ident: 10.1016/j.procs.2025.04.238_bib12
  article-title: Research on computer network information security based on improved machine learning[J]
  publication-title: Journal of Intelligent & Fuzzy Systems
– volume: 13
  start-page: 294
  issue: 4
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib3
  article-title: Knowledge Management Strategy for Handling Cyber Attacks in E-Commerce with Computer Security Incident Response Team (CSIRT)[J]
  publication-title: Journal of Information Security
  doi: 10.4236/jis.2022.134016
– volume: 12
  start-page: 9081
  issue: 10
  year: 2021
  ident: 10.1016/j.procs.2025.04.238_bib7
  article-title: SDN-based security management of multiple WoT smart spaces[J]
  publication-title: Journal of Ambient Intelligence and Humanized Computing
  doi: 10.1007/s12652-020-02601-y
– volume: 10
  start-page: 102
  issue: 8
  year: 2021
  ident: 10.1016/j.procs.2025.04.238_bib6
  article-title: Proposal for an implementation guide for a computer security incident response team on a university campus[J]
  publication-title: Computers
  doi: 10.3390/computers10080102
– volume: 32
  start-page: 1011
  issue: 6
  year: 2023
  ident: 10.1016/j.procs.2025.04.238_bib13
  article-title: Continuous improvement of information security management: an organisational learning perspective[J]
  publication-title: European Journal of Information Systems
  doi: 10.1080/0960085X.2022.2096491
– volume: 183
  start-page: 64
  issue: 1
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib9
  article-title: Towards security automation in software defined networks[J]
  publication-title: Computer Communications
  doi: 10.1016/j.comcom.2021.11.014
– volume: 36
  start-page: 165
  issue: 6
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib5
  article-title: Ai-based autonomic and scalable security management architecture for secure network slicing in b5g[J]
  publication-title: IEEE Network
  doi: 10.1109/MNET.104.2100495
– volume: 208
  start-page: 570
  issue: 1
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib4
  article-title: Computer network security technology and prevention strategy analysis[J]
  publication-title: Procedia Computer Science
  doi: 10.1016/j.procs.2022.10.079
– volume: 26
  start-page: 7871
  issue: 16
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib1
  article-title: Computer application under the management of network information security technology using genetic algorithm[J]
  publication-title: Soft Computing
  doi: 10.1007/s00500-022-06813-6
– volume: 28
  start-page: 2861
  issue: 4
  year: 2021
  ident: 10.1016/j.procs.2025.04.238_bib10
  article-title: A review on the effectiveness of machine learning and deep learning algorithms for cyber security[J]
  publication-title: Archives of Computational Methods in Engineering
  doi: 10.1007/s11831-020-09478-2
– volume: 8
  start-page: 27
  issue: 2
  year: 2022
  ident: 10.1016/j.procs.2025.04.238_bib11
  article-title: The position of the Computer Security Incidents Response Teams in the national cybersecurity system[J]
  publication-title: Cybersecurity and Law
  doi: 10.35467/cal/157121
SSID ssj0000388917
Score 2.3427696
SourceID crossref
SourceType Index Database
StartPage 494
Title Optimization Application of Dynamic Programming Algorithm in Computer Security Management
Volume 261
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: M~E
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV25TsNAEF1xFTTciFtbUGKJ7GFnS8QhCq4CpKSyst5dSEQclASUim9n9rBjEoRIQWM5a2dk-1kz49GbNwgdMwgzsqZqkaybxFarwA_GREUxlfA9wYVmyknm3yR3d_VGQzyEYZwDN04gyfP6aCTe_hVqWAOwbevsDHCXRmEB9gF02ALssP0T8PfgBLqhu9InmVmZFl74-fO2PcCysrquJvL63Ou3hy9d3wDohzyEOjxk6BP8mJDHuv4CeLUcJd39IYTSkuDjWALNIjCGuoLvPg5OsJ4kkdWF8THih7XgOYnXUQ--j_lpxSGMciddMO2hfbGgY-NDZuXSCbdSs8RLvHzXw56IUyV7sCCmdVJnJLVG0lOWgpF5tEgSLiy37_ZzXGyzkjfCTV8u76NQoHJcv6mLqWQplXTjcQ2thO8EfObxXUdzOt9AqwU8OLjkTdSswo0rcOOewQFuXIEbl3Djdo7H9gLceAz3Fnq6unw8v47CuIwos1MPIsi8bD7dIoZqxpMWyYxWVDKqKTeccn2aSZ7AEWnbiYmkhsUtESvCJBUKPP82Wsh7ud5BWMoWi2MhaaxqTGkjhFHEMCa1gHSP0110UjwewMCpoqS_oLI32-n7aNn-8oWuA7Qw7L_rQ7SUfQzbg_6RQ_YLjNxeYw
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimization+Application+of+Dynamic+Programming+Algorithm+in+Computer+Security+Management&rft.jtitle=Procedia+computer+science&rft.au=Li%2C+Ying&rft.date=2025&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=261&rft.spage=494&rft.epage=503&rft_id=info:doi/10.1016%2Fj.procs.2025.04.238&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2025_04_238
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon