Malicious Intrusion Data Mining Algorithm of Wireless Personal Communication Network Supported by Legal Big Data
Wireless personal communication network is easily affected by intrusion data in the communication process, resulting in the inability to ensure the security of personal information in wireless communication. Therefore, this paper proposes a malicious intrusion data mining algorithm based on legitima...
Main Author: | Kai Ji |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2021-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2021/8321636 |
Similar Items
-
Data and Energy Integrated Communication Networks for Wireless Big Data
by: Kun Yang, et al.
Published: (2016-01-01) -
Big Data Mining: Tools & Algorithms
by: Adeel Shiraz Hashmi, et al.
Published: (2016-03-01) -
The Legal Issues of Big Data Mining - On the Perspective of Constitution
by: Pei-Hua Lo, et al.
Published: (2018) -
Data Mining For Network Intrusion Detection
by: Li-Yu Ma, et al.
Published: (2005) -
Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks
by: Rupinder Singh, et al.
Published: (2017-01-01)