Application of Primary Components Analysis of Security Threat in Wireless Network

被引:0
|
作者
Qu Zhiming [1 ]
Wang Jingmei [2 ]
机构
[1] Hebei Univ Engn, Sch Civil Engn, Handan 056038, Hebei Province, Peoples R China
[2] Adm Off Handan Construct Ind, Handan 056001, Hebei Province, Peoples R China
关键词
PCA; security threat; wireless network; Eigenvalues;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet Security mechanism of itself is more vulnerable. While coupled with the inherent openness of wireless network media and the limitations of mobile storage and computing resources in the wireless network environment, it does not only have to be encountered with the security threats in the cable network environment but also the emerging wireless-specific threats to the wireless environment. Under the premise of minimizing the information loss of data, the application of the primary components analysis (PCA) in the investigation on security threat in wireless network approved to be practicable. Through linear variation and abandoning a bit of information, PCA can be perfectly divided from the reasons of security threat in wireless network.
引用
收藏
页码:234 / +
页数:2
相关论文
共 50 条
  • [1] Analysis of Security and Threat of Underwater Wireless Sensor Network Topology
    Yang, Guang
    Wei, Zhiqiang
    Cong, Yanping
    Jia, Dongning
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [2] Application Research on Primary Components Analysis in Assessing Influential Factors of Campus Network Security
    Qu Zhiming
    Wang Xiaoli
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 214 - +
  • [3] Application of graph theory in threat situation analysis of network security
    Telecommunication Engineering Institute, Air Force Engineering University, Xi'an 710077, China
    Beijing Youdian Daxue Xuebao, 2009, 1 (113-117):
  • [4] Security and application of wireless sensor network
    Zhang Huanan
    Xing Suping
    Wang Jiannan
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 486 - 492
  • [5] Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
    Demidov, R. A.
    Zegzhda, P. D.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 971 - 976
  • [6] Wireless security threat taxonomy
    Welch, D
    Lathrop, S
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 76 - 83
  • [7] Application of Wireless Sensor System on Security Network
    Oh, Sechang
    Kwon, Hyeokjun
    Yoon, Hargsoon
    Varadan, Vijay K.
    NANOSENSORS, BIOSENSORS, AND INFO-TECH SENSORS AND SYSTEMS 2010, 2010, 7646
  • [8] Application of RSSI on indoor security wireless network
    Lee, Yang-Han
    Wu, Rong-Hou
    Chuang, Ming-Hsueh
    Jan, Yih-Guang
    Jau, Liang-Lin
    Tzeng, Shian-Wei
    Mei, Kung-Chen
    IASTED International Conference on Wireless Networks and Emerging Technologies, 2005, : 117 - 119
  • [9] Application of BP Neural Network in Wireless Network Security Evaluation
    Fu, Jianxin
    Huang, Lianfen
    Yao, Yan
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 592 - 596
  • [10] Security Threat Analysis and Countermeasures on Consensus-Based Time Synchronization Algorithms for Wireless Sensor Network
    Jha S.K.
    Gupta A.
    Panigrahi N.
    SN Computer Science, 2021, 2 (5)