Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming
In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main...
Saved in:
| Published in: | Mathematical problems in engineering Vol. 2022; pp. 1 - 13 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
Hindawi
25.03.2022
John Wiley & Sons, Inc |
| Subjects: | |
| ISSN: | 1024-123X, 1563-5147 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected. |
|---|---|
| AbstractList | In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected. |
| Author | Sun, Ling Gao, Dali |
| Author_xml | – sequence: 1 givenname: Ling surname: Sun fullname: Sun, Ling organization: School of Information EngineeringHenan University of Animal Husbandry and EconomyZhengzhou 450044HenanChina – sequence: 2 givenname: Dali orcidid: 0000-0002-9110-2605 surname: Gao fullname: Gao, Dali organization: School of Mathematics and Computer ScienceQuanzhou Normal UniversityQuanzhou 362000FujianChinaqztc.edu.cn |
| BookMark | eNp9kD1PwzAQhi0EEqWw8QMiMUKoP2KnHUv5qgSioh3YIjc-F6MkLrYj1J0fjtt0QoLp7qTnudO9J-iwsQ0gdE7wNSGcDyimdMBIRrgYHqBeLCzlJMsPY49plhLK3o7RifcfGFPCybCHvudQts6ETTIOwYRWQTJzoEwZjG2SZ6ugSqxOIuUgpK9QyQAqmdh63QZwybTR1tVyB883PkCd3EgfiTjfGh-cWbZbYSadrKq4qzNNs4pn7MrJuo79KTrSsvJwtq99tLi_W0we06eXh-lk_JSWjOUhzTLKYJkJLXEOUjKtcTksudQjJSgQxSilSo4YXwrOaYZzIYXWUYEy10yxPrro1q6d_WzBh-LDtq6JFwsqMiFYnufDSNGOKp313oEuShN2HwYnTVUQXGzDLrZhF_uwo3T1S1o7U0u3-Qu_7PB30yj5Zf6nfwA0l5E0 |
| CitedBy_id | crossref_primary_10_2478_amns_2024_1567 crossref_primary_10_2478_amns_2024_1447 |
| Cites_doi | 10.17762/turcomat.v12i4.612 10.1016/j.jbusres.2021.01.029 10.1016/j.jpdc.2020.05.004 10.1016/j.future.2018.06.046 10.9734/ajrcos/2021/v7i430189 10.1111/joca.12335 10.38094/jastt1329 10.1016/j.jbusres.2020.12.034 10.1016/j.jbusres.2020.01.046 10.1016/j.future.2019.02.050 10.1007/s10098-020-01886-z 10.1007/978-981-15-2780-7_7 10.1016/j.jbusres.2020.10.045 10.1007/s12652-020-02696-3 10.48161/qaj.v1n2a52 10.12785/ijcds/090206 10.1007/s10462-019-09685-9 10.1016/j.jbusres.2020.05.046 10.1016/j.jbusres.2020.03.034 10.1016/j.jbusres.2020.01.031 10.1016/j.jbusres.2020.01.045 10.1080/17445760.2017.1422501 10.1080/0960085x.2018.1524417 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Ling Sun and Dali Gao. Copyright © 2022 Ling Sun and Dali Gao. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2022 Ling Sun and Dali Gao. – notice: Copyright © 2022 Ling Sun and Dali Gao. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU CWDGH DWQXO FR3 GNUQQ HCIFZ JQ2 K7- KR7 L6V M7S P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.1155/2022/3141568 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One Middle East & Africa Database ProQuest Central Korea Engineering Research Database ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest - Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection Middle East & Africa Database ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences Engineering |
| EISSN | 1563-5147 |
| Editor | Sun, Gengxin |
| Editor_xml | – sequence: 1 givenname: Gengxin surname: Sun fullname: Sun, Gengxin |
| EndPage | 13 |
| ExternalDocumentID | 10_1155_2022_3141568 |
| GrantInformation_xml | – fundername: Henan University of Animal Husbandry and Economy |
| GroupedDBID | 29M 2WC 3V. 4.4 5GY 5VS 8FE 8FG 8R4 8R5 AAFWJ AAJEY ABDBF ABJCF ABUWG ACIPV ACIWK ADBBV AENEX AFKRA AINHJ ALMA_UNASSIGNED_HOLDINGS ARAPS BCNDV BENPR BGLVJ BPHCQ CCPQU CS3 CWDGH E3Z EBS ESX GROUPED_DOAJ HCIFZ I-F IAO IEA IOF ISR ITC K6V K7- KQ8 L6V M7S MK~ M~E OK1 P2P P62 PIMPY PQQKQ PROAC PTHSS Q2X REM RHU RHW RHX RNS TR2 TUS XSB YQT ~8M 0R~ 24P AAMMB AAYXX ACCMX AEFGJ AFFHD AGXDD AIDQK AIDYY ALUQN CITATION H13 OVT PHGZM PHGZT PQGLB 7TB 8FD AZQEC DWQXO FR3 GNUQQ JQ2 KR7 PKEHL PQEST PQUKI PRINS |
| ID | FETCH-LOGICAL-c337t-4423eb46fa07eaa3ff0c8c5af9d62e1d3222da935b65524076a6ff3ebec7f3d3 |
| IEDL.DBID | RHX |
| ISICitedReferencesCount | 2 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000807373700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1024-123X |
| IngestDate | Fri Jul 25 10:03:42 EDT 2025 Tue Nov 18 22:00:17 EST 2025 Sat Nov 29 06:37:25 EST 2025 Sun Jun 02 18:50:25 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-4423eb46fa07eaa3ff0c8c5af9d62e1d3222da935b65524076a6ff3ebec7f3d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-9110-2605 |
| OpenAccessLink | https://dx.doi.org/10.1155/2022/3141568 |
| PQID | 2646637778 |
| PQPubID | 237775 |
| PageCount | 13 |
| ParticipantIDs | proquest_journals_2646637778 crossref_citationtrail_10_1155_2022_3141568 crossref_primary_10_1155_2022_3141568 hindawi_primary_10_1155_2022_3141568 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-03-25 |
| PublicationDateYYYYMMDD | 2022-03-25 |
| PublicationDate_xml | – month: 03 year: 2022 text: 2022-03-25 day: 25 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | Mathematical problems in engineering |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 11 22 12 23 13 14 15 16 17 18 19 1 2 3 4 5 6 7 8 9 20 10 21 |
| References_xml | – ident: 4 doi: 10.17762/turcomat.v12i4.612 – ident: 10 doi: 10.1016/j.jbusres.2021.01.029 – ident: 12 doi: 10.1016/j.jpdc.2020.05.004 – ident: 19 doi: 10.1016/j.future.2018.06.046 – ident: 16 doi: 10.9734/ajrcos/2021/v7i430189 – ident: 3 doi: 10.1111/joca.12335 – ident: 8 doi: 10.38094/jastt1329 – ident: 21 doi: 10.1016/j.jbusres.2020.12.034 – ident: 9 doi: 10.1016/j.jbusres.2020.01.046 – ident: 14 doi: 10.1016/j.future.2019.02.050 – ident: 7 doi: 10.1007/s10098-020-01886-z – ident: 13 doi: 10.1007/978-981-15-2780-7_7 – ident: 11 doi: 10.1016/j.jbusres.2020.10.045 – ident: 2 doi: 10.1007/s12652-020-02696-3 – ident: 15 doi: 10.48161/qaj.v1n2a52 – ident: 18 doi: 10.12785/ijcds/090206 – ident: 22 doi: 10.1007/s10462-019-09685-9 – ident: 17 doi: 10.1016/j.jbusres.2020.05.046 – ident: 23 doi: 10.1016/j.jbusres.2020.03.034 – ident: 1 doi: 10.1016/j.jbusres.2020.01.031 – ident: 5 doi: 10.1016/j.jbusres.2020.01.045 – ident: 6 doi: 10.1080/17445760.2017.1422501 – ident: 20 doi: 10.1080/0960085x.2018.1524417 |
| SSID | ssj0021518 |
| Score | 2.3063626 |
| Snippet | In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet... |
| SourceID | proquest crossref hindawi |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Accuracy Algorithms Construction Cybersecurity Defense Efficiency Engineering Error correction Game theory Human behavior Information systems Intranets Intrusion detection systems Local area networks Markov chains Monitoring Network security Prediction models Probability Risk assessment Security systems Wireless networks |
| SummonAdditionalLinks | – databaseName: Engineering Database dbid: M7S link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELaggAQDhQKivOShTMhqG8d5TKg8KgZUVWqHbpHjh6hU2pIE-AP8cHyuU0AIGNji5BJHurPvzj5_H0IN4zOlSTsiomnMiC98QWIVcBK3pKa-9FmbW8j8-7DXi0ajuO8W3HJXVlnOiXailjMBa-RN47iNcwzDMLqcPxFgjYLdVUehsYrWACWhbUv3BsuEy9xZHIXzAJuPjsrCd8Yg5_eatA3pS_TFJW08QC78Ov42N1uH063-91d30LYLNXFnYRu7aEVNa6jqwk7sBnVeQ1ufMAn30NvAMdrhTgFlBFLhfga7OaBBDNRpEzzTeADhZkFsLZ35WkkOgd3xJiu8QEPHV8ZRSmzaNwDSC_xaptnnGbC4TNybpmvTjS0VezTX-2jYvR1e3xFH1UAEpWFBfBOVqdQPNG-FinOqdUtEgnEdy8BTbQn7OZLHlKUBY5BEBjzQmoIFhZpKeoAq09lUHSJsTEpSIeKUG1tJU5NOssC3EEEqDWQrrqOLUlmJcDDmwKYxSWw6w1gCqk2cauvofCk9X8B3_CDXcHr_Q-yk1HjixnqefKj76PfHx2gTPgYVbB47QZUie1anaF28FOM8O7Om-w5YePa2 priority: 102 providerName: ProQuest |
| Title | Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming |
| URI | https://dx.doi.org/10.1155/2022/3141568 https://www.proquest.com/docview/2646637778 |
| Volume | 2022 |
| WOSCitedRecordID | wos000807373700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: K7- dateStart: 20080101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: M7S dateStart: 20080101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: Middle East & Africa Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: CWDGH dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.proquest.com/middleeastafrica providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest advanced technologies & aerospace journals customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: P5Z dateStart: 20080101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central (New) customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: BENPR dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1563-5147 dateEnd: 20250131 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: PIMPY dateStart: 20080101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1563-5147 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021518 issn: 1024-123X databaseCode: 24P dateStart: 19950101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB6sD_DiW3zUsod6ksW2m83j6BNFLaH1UL2EzT5QqFXaqH_AH-5MuhW0iF5ClswmsF-SmY-Z_Qagjj7TIO2IuROJ5IEONE9sqHjSME4EJpBNVUrmX0ftdtzrJakXSRpNp_DR2xE9bx2KJjGNuAKVWFLlVuei98Wr0GmNd7y1SIJP9Cb17T_mfvM8Cw9Eed8fp37BpV85X4ElHxCyozGCqzBjB2uw7IND5j-90Tp8dH2nOXZUUHrfWJYOKctCK8uopVmfPTvWpTCw4GWNG86fNG1gfttRaTxWKWfH6MAMw_EpiedS3yscpmpI3VX6fiY6NnxMWcL1hOcbcHt-dntywX0LBa6FiAoeYLRk8yB0qhFZpYRzDR1rqVxiwpZtGsqzGJUImYdSErkLVeicIGQjJ4zYhNnB88BuAUOojdA6yRVimOdI82QYlNI9Ng9NI9mGg8nqZtrLi1OXi35W0gwpM8Ii81hsw_6X9ctYVuMXu7oH6g-z6gTFzH-DowxDPQynoiiKd_53l11YpCFVmLVkFWaL4avdg3n9VjyOhjWYOz5rp50aVK4iXqMa0S4eU3mPV9LLm_SuVr6Vn83b1zc |
| linkProvider | Hindawi Publishing |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VFtRyoNAWUSjgQ3tCVnfjOE4OCBVK1WqX1Urdw94ixx-i0rJbdkMr7vwd_iMzjtOCqsKpB26xMnEU541nxh7PA9hFm2kx7Mi5F4XkqUkNL1ymedGxXqQ2lV0dSub31WCQj8fFcAl-tmdhKK2ynRPDRG1nhtbI99Fwo3FUSuXvzr9yYo2i3dWWQqOBRc99v8SQbfH25BD_716SHH0cfTjmkVWAGyFUzVN0IFyVZl53lNNaeN8xuZHaFzZLXNfS1oPVhZBVJiXFO5nOvBf0scoLK7Dbe7CSilyRWvUUv4rv0Hg2J-8SKgUoxm2evZS0xJDsiy5FS_kfFvDBZwq9L89umIJg347W_7OReQyPoiPNDhrkP4ElN92A9ehUszhlLTbg4W8VFzfhx2nk62MHNSVJWMeGc9qrInwyIoabsJlnp-RM1zxkCmJvLfUFi4e3gnBT6529RzfAMmwfUgliYg_D5lDPiaNmEp_EV-NrQiLcF7zegtFdDMxTWJ7Opu4ZMFQYK4wpKo2aUFUYLMssDQWQXJXZTrENb1pslCYWaSeukEkZgjUpS0JSGZG0DXtX0udNcZJb5HYjzP4httMCrIwz2aK8Rtfzv99-DavHo0_9sn8y6L2ANeqYcvUSuQPL9fybewn3zUV9tpi_ClrDoLxjLP4ChVVUpg |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3PTxQxFH5BVCIHUYQIovYAJ9Ps7nQ6Pw7GIOtGAtlMAoeNl0mnPyLJsgu7A4Q7_xT_ne91Oigx6omDt2mm08l0vva9r319H8A22kyDtCPjTuSSxzrWPLeJ4nnXOBGbWPaUT5l_mA6H2WiUFwtw256FobDKdk70E7WZaloj76DhRuOYpmnWcSEsougPPp2dc1KQop3WVk6jgciBvb5C-jb_uN_Hf70TRYMvx3tfeVAY4FqItOYxOhO2ihOnuqlVSjjX1ZmWyuUmiWzP0DaEUbmQVSIlcZ9EJc4J-vDUCSOw2UfwOEWKSdGEhfx2x_XQkDan8CJKCyhGbcy9lLTcEHVEj5hTds8aPv1ONPzq5Dez4G3dYOU_7qUX8Dw42Gy3GREvYcFOVmElONssTGXzVVj-JRPjK7g5Cjp-bLem4AljWTGjPSzCLSPBuDGbOnZETnbNfQQhttZKYrBwqMtXbnLAs8_oHhiG5T6lJiZVMSwWakbaNePwJL4aX-MD5E7xeg2OH6Jj1mFxMp3Y18BwIBmhdV4pHCFVhSRaJrFPjGSrxHTzDfjQ4qTUIXk7aYiMS0_ipCwJVWVA1Qbs3NU-a5KW_KHedoDcP6pttWArwww3L38ibfPvt9_DEkKwPNwfHryBZ9QuhfBFcgsW69mFfQtP9GV9Mp-98wOIQfnAUPwBZfVdyg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Attitude+Prediction+Model+of+Secret-Related+Computer+Information+System+Based+on+Distributed+Parallel+Computing+Programming&rft.jtitle=Mathematical+problems+in+engineering&rft.au=Sun%2C+Ling&rft.au=Gao%2C+Dali&rft.date=2022-03-25&rft.pub=Hindawi&rft.issn=1024-123X&rft.eissn=1563-5147&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F3141568&rft.externalDocID=10_1155_2022_3141568 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1024-123X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1024-123X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1024-123X&client=summon |