Application of Primary Components Analysis of Security Threat in Wireless Network

被引:0
|
作者
Qu Zhiming [1 ]
Wang Jingmei [2 ]
机构
[1] Hebei Univ Engn, Sch Civil Engn, Handan 056038, Hebei Province, Peoples R China
[2] Adm Off Handan Construct Ind, Handan 056001, Hebei Province, Peoples R China
关键词
PCA; security threat; wireless network; Eigenvalues;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet Security mechanism of itself is more vulnerable. While coupled with the inherent openness of wireless network media and the limitations of mobile storage and computing resources in the wireless network environment, it does not only have to be encountered with the security threats in the cable network environment but also the emerging wireless-specific threats to the wireless environment. Under the premise of minimizing the information loss of data, the application of the primary components analysis (PCA) in the investigation on security threat in wireless network approved to be practicable. Through linear variation and abandoning a bit of information, PCA can be perfectly divided from the reasons of security threat in wireless network.
引用
收藏
页码:234 / +
页数:2
相关论文
共 50 条
  • [31] Wireless Sensor Network Simulation for Security and Performance Analysis
    Diaz, A.
    Sanchez, P.
    Sancho, J.
    Rico, J.
    DESIGN, AUTOMATION & TEST IN EUROPE, 2013, : 432 - 435
  • [32] Analysis of wireless network security for data transmission performance
    Sawicki, Daniel
    Smyk, Sebastian
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2019, 2019, 11176
  • [33] Wireless Sensor Network Security Analysis for Data and Aggregation
    Manoharan, Maravarman
    Babu, S.
    Pitchai, R.
    JOURNAL OF INTERCONNECTION NETWORKS, 2023, 23 (02)
  • [34] Network Security in the Context of the Botnets Threat
    Constantinescu, Radu
    Zota, Razvan Daniel
    Vasilescu, Adrian
    6TH ROEDUNET INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 80 - 82
  • [35] Probabilistic Threat Propagation for Network Security
    Carter, Kevin M.
    Idika, Nwokedi
    Streilein, William W.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1394 - 1405
  • [36] Application Analysis of Computer Network Security Technology Based on Network Security Maintenance
    Ma, Xiang
    Lecture Notes in Electrical Engineering, 2022, 827 LNEE : 1253 - 1258
  • [37] Network Security Threat Intelligence Prediction in Network Traffic Analysis Based on Machine Learning
    Guan Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [38] Research Into the Security Threat of Web Application
    Zhang, Yanling
    Zhang, Ting
    JOURNAL OF WEB ENGINEERING, 2022, 21 (05): : 1707 - 1726
  • [39] A Security Framework for Military Application on Infrastructure Based Wireless Sensor Network
    Roy, Sudipto
    Nene, Manisha J.
    2015 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2015, : 369 - 376
  • [40] Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
    M Indra Sena Reddy
    K Subba Reddy
    P J Bhatt
    Rajeev Chetwani
    JournalofElectronicScienceandTechnology, 2012, 10 (03) : 215 - 219