Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming

In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main...

Full description

Saved in:
Bibliographic Details
Published in:Mathematical problems in engineering Vol. 2022; pp. 1 - 13
Main Authors: Sun, Ling, Gao, Dali
Format: Journal Article
Language:English
Published: New York Hindawi 25.03.2022
John Wiley & Sons, Inc
Subjects:
ISSN:1024-123X, 1563-5147
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
AbstractList In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
Author Sun, Ling
Gao, Dali
Author_xml – sequence: 1
  givenname: Ling
  surname: Sun
  fullname: Sun, Ling
  organization: School of Information EngineeringHenan University of Animal Husbandry and EconomyZhengzhou 450044HenanChina
– sequence: 2
  givenname: Dali
  orcidid: 0000-0002-9110-2605
  surname: Gao
  fullname: Gao, Dali
  organization: School of Mathematics and Computer ScienceQuanzhou Normal UniversityQuanzhou 362000FujianChinaqztc.edu.cn
BookMark eNp9kD1PwzAQhi0EEqWw8QMiMUKoP2KnHUv5qgSioh3YIjc-F6MkLrYj1J0fjtt0QoLp7qTnudO9J-iwsQ0gdE7wNSGcDyimdMBIRrgYHqBeLCzlJMsPY49plhLK3o7RifcfGFPCybCHvudQts6ETTIOwYRWQTJzoEwZjG2SZ6ugSqxOIuUgpK9QyQAqmdh63QZwybTR1tVyB883PkCd3EgfiTjfGh-cWbZbYSadrKq4qzNNs4pn7MrJuo79KTrSsvJwtq99tLi_W0we06eXh-lk_JSWjOUhzTLKYJkJLXEOUjKtcTksudQjJSgQxSilSo4YXwrOaYZzIYXWUYEy10yxPrro1q6d_WzBh-LDtq6JFwsqMiFYnufDSNGOKp313oEuShN2HwYnTVUQXGzDLrZhF_uwo3T1S1o7U0u3-Qu_7PB30yj5Zf6nfwA0l5E0
CitedBy_id crossref_primary_10_2478_amns_2024_1567
crossref_primary_10_2478_amns_2024_1447
Cites_doi 10.17762/turcomat.v12i4.612
10.1016/j.jbusres.2021.01.029
10.1016/j.jpdc.2020.05.004
10.1016/j.future.2018.06.046
10.9734/ajrcos/2021/v7i430189
10.1111/joca.12335
10.38094/jastt1329
10.1016/j.jbusres.2020.12.034
10.1016/j.jbusres.2020.01.046
10.1016/j.future.2019.02.050
10.1007/s10098-020-01886-z
10.1007/978-981-15-2780-7_7
10.1016/j.jbusres.2020.10.045
10.1007/s12652-020-02696-3
10.48161/qaj.v1n2a52
10.12785/ijcds/090206
10.1007/s10462-019-09685-9
10.1016/j.jbusres.2020.05.046
10.1016/j.jbusres.2020.03.034
10.1016/j.jbusres.2020.01.031
10.1016/j.jbusres.2020.01.045
10.1080/17445760.2017.1422501
10.1080/0960085x.2018.1524417
ContentType Journal Article
Copyright Copyright © 2022 Ling Sun and Dali Gao.
Copyright © 2022 Ling Sun and Dali Gao. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Ling Sun and Dali Gao.
– notice: Copyright © 2022 Ling Sun and Dali Gao. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CWDGH
DWQXO
FR3
GNUQQ
HCIFZ
JQ2
K7-
KR7
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.1155/2022/3141568
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
ProQuest Technology Collection
ProQuest One
Middle East & Africa Database
ProQuest Central Korea
Engineering Research Database
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest - Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
Middle East & Africa Database
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef
Publicly Available Content Database

Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1563-5147
Editor Sun, Gengxin
Editor_xml – sequence: 1
  givenname: Gengxin
  surname: Sun
  fullname: Sun, Gengxin
EndPage 13
ExternalDocumentID 10_1155_2022_3141568
GrantInformation_xml – fundername: Henan University of Animal Husbandry and Economy
GroupedDBID 29M
2WC
3V.
4.4
5GY
5VS
8FE
8FG
8R4
8R5
AAFWJ
AAJEY
ABDBF
ABJCF
ABUWG
ACIPV
ACIWK
ADBBV
AENEX
AFKRA
AINHJ
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BCNDV
BENPR
BGLVJ
BPHCQ
CCPQU
CS3
CWDGH
E3Z
EBS
ESX
GROUPED_DOAJ
HCIFZ
I-F
IAO
IEA
IOF
ISR
ITC
K6V
K7-
KQ8
L6V
M7S
MK~
M~E
OK1
P2P
P62
PIMPY
PQQKQ
PROAC
PTHSS
Q2X
REM
RHU
RHW
RHX
RNS
TR2
TUS
XSB
YQT
~8M
0R~
24P
AAMMB
AAYXX
ACCMX
AEFGJ
AFFHD
AGXDD
AIDQK
AIDYY
ALUQN
CITATION
H13
OVT
PHGZM
PHGZT
PQGLB
7TB
8FD
AZQEC
DWQXO
FR3
GNUQQ
JQ2
KR7
PKEHL
PQEST
PQUKI
PRINS
ID FETCH-LOGICAL-c337t-4423eb46fa07eaa3ff0c8c5af9d62e1d3222da935b65524076a6ff3ebec7f3d3
IEDL.DBID RHX
ISICitedReferencesCount 2
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000807373700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1024-123X
IngestDate Fri Jul 25 10:03:42 EDT 2025
Tue Nov 18 22:00:17 EST 2025
Sat Nov 29 06:37:25 EST 2025
Sun Jun 02 18:50:25 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-4423eb46fa07eaa3ff0c8c5af9d62e1d3222da935b65524076a6ff3ebec7f3d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-9110-2605
OpenAccessLink https://dx.doi.org/10.1155/2022/3141568
PQID 2646637778
PQPubID 237775
PageCount 13
ParticipantIDs proquest_journals_2646637778
crossref_citationtrail_10_1155_2022_3141568
crossref_primary_10_1155_2022_3141568
hindawi_primary_10_1155_2022_3141568
PublicationCentury 2000
PublicationDate 2022-03-25
PublicationDateYYYYMMDD 2022-03-25
PublicationDate_xml – month: 03
  year: 2022
  text: 2022-03-25
  day: 25
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle Mathematical problems in engineering
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 11
22
12
23
13
14
15
16
17
18
19
1
2
3
4
5
6
7
8
9
20
10
21
References_xml – ident: 4
  doi: 10.17762/turcomat.v12i4.612
– ident: 10
  doi: 10.1016/j.jbusres.2021.01.029
– ident: 12
  doi: 10.1016/j.jpdc.2020.05.004
– ident: 19
  doi: 10.1016/j.future.2018.06.046
– ident: 16
  doi: 10.9734/ajrcos/2021/v7i430189
– ident: 3
  doi: 10.1111/joca.12335
– ident: 8
  doi: 10.38094/jastt1329
– ident: 21
  doi: 10.1016/j.jbusres.2020.12.034
– ident: 9
  doi: 10.1016/j.jbusres.2020.01.046
– ident: 14
  doi: 10.1016/j.future.2019.02.050
– ident: 7
  doi: 10.1007/s10098-020-01886-z
– ident: 13
  doi: 10.1007/978-981-15-2780-7_7
– ident: 11
  doi: 10.1016/j.jbusres.2020.10.045
– ident: 2
  doi: 10.1007/s12652-020-02696-3
– ident: 15
  doi: 10.48161/qaj.v1n2a52
– ident: 18
  doi: 10.12785/ijcds/090206
– ident: 22
  doi: 10.1007/s10462-019-09685-9
– ident: 17
  doi: 10.1016/j.jbusres.2020.05.046
– ident: 23
  doi: 10.1016/j.jbusres.2020.03.034
– ident: 1
  doi: 10.1016/j.jbusres.2020.01.031
– ident: 5
  doi: 10.1016/j.jbusres.2020.01.045
– ident: 6
  doi: 10.1080/17445760.2017.1422501
– ident: 20
  doi: 10.1080/0960085x.2018.1524417
SSID ssj0021518
Score 2.3063626
Snippet In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Accuracy
Algorithms
Construction
Cybersecurity
Defense
Efficiency
Engineering
Error correction
Game theory
Human behavior
Information systems
Intranets
Intrusion detection systems
Local area networks
Markov chains
Monitoring
Network security
Prediction models
Probability
Risk assessment
Security systems
Wireless networks
SummonAdditionalLinks – databaseName: Engineering Database
  dbid: M7S
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwELaggAQDhQKivOShTMhqG8d5TKg8KgZUVWqHbpHjh6hU2pIE-AP8cHyuU0AIGNji5BJHurPvzj5_H0IN4zOlSTsiomnMiC98QWIVcBK3pKa-9FmbW8j8-7DXi0ajuO8W3HJXVlnOiXailjMBa-RN47iNcwzDMLqcPxFgjYLdVUehsYrWACWhbUv3BsuEy9xZHIXzAJuPjsrCd8Yg5_eatA3pS_TFJW08QC78Ov42N1uH063-91d30LYLNXFnYRu7aEVNa6jqwk7sBnVeQ1ufMAn30NvAMdrhTgFlBFLhfga7OaBBDNRpEzzTeADhZkFsLZ35WkkOgd3xJiu8QEPHV8ZRSmzaNwDSC_xaptnnGbC4TNybpmvTjS0VezTX-2jYvR1e3xFH1UAEpWFBfBOVqdQPNG-FinOqdUtEgnEdy8BTbQn7OZLHlKUBY5BEBjzQmoIFhZpKeoAq09lUHSJsTEpSIeKUG1tJU5NOssC3EEEqDWQrrqOLUlmJcDDmwKYxSWw6w1gCqk2cauvofCk9X8B3_CDXcHr_Q-yk1HjixnqefKj76PfHx2gTPgYVbB47QZUie1anaF28FOM8O7Om-w5YePa2
  priority: 102
  providerName: ProQuest
Title Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming
URI https://dx.doi.org/10.1155/2022/3141568
https://www.proquest.com/docview/2646637778
Volume 2022
WOSCitedRecordID wos000807373700005&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: K7-
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: M7S
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Middle East & Africa Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: CWDGH
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/middleeastafrica
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest advanced technologies & aerospace journals
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: P5Z
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central (New)
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: BENPR
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 20250131
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: PIMPY
  dateStart: 20080101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1563-5147
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021518
  issn: 1024-123X
  databaseCode: 24P
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB6sD_DiW3zUsod6ksW2m83j6BNFLaH1UL2EzT5QqFXaqH_AH-5MuhW0iF5ClswmsF-SmY-Z_Qagjj7TIO2IuROJ5IEONE9sqHjSME4EJpBNVUrmX0ftdtzrJakXSRpNp_DR2xE9bx2KJjGNuAKVWFLlVuei98Wr0GmNd7y1SIJP9Cb17T_mfvM8Cw9Eed8fp37BpV85X4ElHxCyozGCqzBjB2uw7IND5j-90Tp8dH2nOXZUUHrfWJYOKctCK8uopVmfPTvWpTCw4GWNG86fNG1gfttRaTxWKWfH6MAMw_EpiedS3yscpmpI3VX6fiY6NnxMWcL1hOcbcHt-dntywX0LBa6FiAoeYLRk8yB0qhFZpYRzDR1rqVxiwpZtGsqzGJUImYdSErkLVeicIGQjJ4zYhNnB88BuAUOojdA6yRVimOdI82QYlNI9Ng9NI9mGg8nqZtrLi1OXi35W0gwpM8Ii81hsw_6X9ctYVuMXu7oH6g-z6gTFzH-DowxDPQynoiiKd_53l11YpCFVmLVkFWaL4avdg3n9VjyOhjWYOz5rp50aVK4iXqMa0S4eU3mPV9LLm_SuVr6Vn83b1zc
linkProvider Hindawi Publishing
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9QwEB2VFtRyoNAWUSjgQ3tCVnfjOE4OCBVK1WqX1Urdw94ixx-i0rJbdkMr7vwd_iMzjtOCqsKpB26xMnEU541nxh7PA9hFm2kx7Mi5F4XkqUkNL1ymedGxXqQ2lV0dSub31WCQj8fFcAl-tmdhKK2ynRPDRG1nhtbI99Fwo3FUSuXvzr9yYo2i3dWWQqOBRc99v8SQbfH25BD_716SHH0cfTjmkVWAGyFUzVN0IFyVZl53lNNaeN8xuZHaFzZLXNfS1oPVhZBVJiXFO5nOvBf0scoLK7Dbe7CSilyRWvUUv4rv0Hg2J-8SKgUoxm2evZS0xJDsiy5FS_kfFvDBZwq9L89umIJg347W_7OReQyPoiPNDhrkP4ElN92A9ehUszhlLTbg4W8VFzfhx2nk62MHNSVJWMeGc9qrInwyIoabsJlnp-RM1zxkCmJvLfUFi4e3gnBT6529RzfAMmwfUgliYg_D5lDPiaNmEp_EV-NrQiLcF7zegtFdDMxTWJ7Opu4ZMFQYK4wpKo2aUFUYLMssDQWQXJXZTrENb1pslCYWaSeukEkZgjUpS0JSGZG0DXtX0udNcZJb5HYjzP4httMCrIwz2aK8Rtfzv99-DavHo0_9sn8y6L2ANeqYcvUSuQPL9fybewn3zUV9tpi_ClrDoLxjLP4ChVVUpg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3PTxQxFH5BVCIHUYQIovYAJ9Ps7nQ6Pw7GIOtGAtlMAoeNl0mnPyLJsgu7A4Q7_xT_ne91Oigx6omDt2mm08l0vva9r319H8A22kyDtCPjTuSSxzrWPLeJ4nnXOBGbWPaUT5l_mA6H2WiUFwtw256FobDKdk70E7WZaloj76DhRuOYpmnWcSEsougPPp2dc1KQop3WVk6jgciBvb5C-jb_uN_Hf70TRYMvx3tfeVAY4FqItOYxOhO2ihOnuqlVSjjX1ZmWyuUmiWzP0DaEUbmQVSIlcZ9EJc4J-vDUCSOw2UfwOEWKSdGEhfx2x_XQkDan8CJKCyhGbcy9lLTcEHVEj5hTds8aPv1ONPzq5Dez4G3dYOU_7qUX8Dw42Gy3GREvYcFOVmElONssTGXzVVj-JRPjK7g5Cjp-bLem4AljWTGjPSzCLSPBuDGbOnZETnbNfQQhttZKYrBwqMtXbnLAs8_oHhiG5T6lJiZVMSwWakbaNePwJL4aX-MD5E7xeg2OH6Jj1mFxMp3Y18BwIBmhdV4pHCFVhSRaJrFPjGSrxHTzDfjQ4qTUIXk7aYiMS0_ipCwJVWVA1Qbs3NU-a5KW_KHedoDcP6pttWArwww3L38ibfPvt9_DEkKwPNwfHryBZ9QuhfBFcgsW69mFfQtP9GV9Mp-98wOIQfnAUPwBZfVdyg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Attitude+Prediction+Model+of+Secret-Related+Computer+Information+System+Based+on+Distributed+Parallel+Computing+Programming&rft.jtitle=Mathematical+problems+in+engineering&rft.au=Sun%2C+Ling&rft.au=Gao%2C+Dali&rft.date=2022-03-25&rft.pub=Hindawi&rft.issn=1024-123X&rft.eissn=1563-5147&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F3141568&rft.externalDocID=10_1155_2022_3141568
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1024-123X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1024-123X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1024-123X&client=summon