{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:51:36Z","timestamp":1777704696810,"version":"3.51.4"},"reference-count":21,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2020,12,4]]},"abstract":"<jats:p>To build a network security system combining active defense and passive defense during covid-19, we need to break the original Castle type passive defense concept and build a reliable, controllable, flexible and active network environment to find defense points. The key is that the system should be able to actively predict and control our defenses. Any scheme cannot achieve absolute safety, only to minimize the probability of safety accidents, through various measures to assess and predict the possible points of safety accidents, and actively prevent the occurrence of accidents. In the management and construction of network security, we should realize that network security management is a comprehensive system engineering. We should start from the three aspects of strategy, management and technology, and build a more effective and reliable network security system on the basis of traditional passive defense and active defense technology, which can better maintain big data security during covid-19.<\/jats:p>","DOI":"10.3233\/jifs-189287","type":"journal-article","created":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T12:46:01Z","timestamp":1600433161000},"page":"8897-8905","source":"Crossref","is-referenced-by-count":5,"title":["Network security model based on active defense and passive defense hybrid strategy"],"prefix":"10.1177","volume":"39","author":[{"given":"Gaoli","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Information Engineering, Henan institute of Science and Technology, Xinxiang, China"},{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, China"}]},{"given":"Junping","family":"Song","sequence":"additional","affiliation":[{"name":"Xinke college, Henan institute of Science and Technology, Xinxiang, China"}]}],"member":"179","reference":[{"issue":"4","key":"10.3233\/JIFS-189287_ref1","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1016\/j.camwa.2011.06.035","article-title":"A model for evaluating computer network security systems with 2-tuple linguistic information","volume":"62","author":"Zhang","year":"2011","journal-title":"Computers & Mathematics with Applications"},{"issue":"2","key":"10.3233\/JIFS-189287_ref2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MNET.1987.6434188","article-title":"Network security: Protocol reference model and the trusted computer system evaluation criteria","volume":"1","author":"Abrams","year":"1987","journal-title":"IEEE Network"},{"issue":"4","key":"10.3233\/JIFS-189287_ref3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2018.2141032","article-title":"Game-Model-Based Network Security Risk Control","volume":"51","author":"Ni","year":"2018","journal-title":"Computer"},{"issue":"5","key":"10.3233\/JIFS-189287_ref4","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1109\/LCOMM.2016.2524404","article-title":"Cloud Belief Rule Base Model for Network Security Situation Prediction","volume":"20","author":"Hu","year":"2016","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"10.3233\/JIFS-189287_ref5","first-page":"1044","article-title":"Model-based configuration management of security systems in complex network environments","volume":"19","author":"by de Albuquerque","year":"2013","journal-title":"Journal of Plant Physiology"},{"issue":"1","key":"10.3233\/JIFS-189287_ref6","first-page":"1031","article-title":"Model-based management of security services in complex network environments","volume":"40","author":"de Albuquerque","year":"2008","journal-title":"Journal of Mathematical Chemistry"},{"issue":"12","key":"10.3233\/JIFS-189287_ref7","doi-asserted-by":"crossref","first-page":"2168","DOI":"10.1111\/risa.12064","article-title":"Global Maize Trade and Food Security: Implications from a Social Network Model","volume":"33","author":"Wu","year":"2013","journal-title":"Risk Analysis"},{"issue":"4","key":"10.3233\/JIFS-189287_ref8","first-page":"564","article-title":"Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)","volume":"64","author":"Netze","year":"2011","journal-title":"American Journal of Orthopsychiatry"},{"issue":"3","key":"10.3233\/JIFS-189287_ref9","first-page":"313","article-title":"RINSE: The Real-Time Immersive Network Simulation Environment for network security exercises (extended, version)","volume":"47","author":"Liljenstam","year":"2007","journal-title":"Operations Research"},{"issue":"4","key":"10.3233\/JIFS-189287_ref10","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2018.2141032","article-title":"Game-Model-Based Network Security Risk Control","volume":"51","author":"Ni","year":"2018","journal-title":"Computer"},{"issue":"3","key":"10.3233\/JIFS-189287_ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3311888","article-title":"Naming Content on the Network Layer: A Security Analysis of the Information-Centric Network Model","volume":"52","author":"Mannes","year":"2019","journal-title":"ACM Computing Surveys"},{"key":"10.3233\/JIFS-189287_ref12","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.ssci.2019.06.004","article-title":"Stochastic model for emotion contagion in social networks security based on machine learning","volume":"118","author":"Fei","year":"2019","journal-title":"Safety Science"},{"issue":"01","key":"10.3233\/JIFS-189287_ref13","first-page":"166","article-title":"Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction","volume":"28","author":"Guang","year":"2019","journal-title":"Chinese Journal of Electronics"},{"issue":"JUL.","key":"10.3233\/JIFS-189287_ref14","first-page":"166","article-title":"Abnormal detection method of industrial control system based on behavior model","volume":"84","author":"Lai","year":"2019","journal-title":"Computers & Security"},{"issue":"MAR.","key":"10.3233\/JIFS-189287_ref15","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.adhoc.2018.09.014","article-title":"Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device","volume":"84","author":"Feng","year":"2019","journal-title":"Ad Hoc Networks"},{"issue":"AUG.","key":"10.3233\/JIFS-189287_ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jcss.2017.11.004","article-title":"The relationship between extra connectivity and conditional diagnosability of regular graphs under the PMC model","volume":"95","author":"Lin","year":"2018","journal-title":"Journal of Computer and System Sciences"},{"issue":"4","key":"10.3233\/JIFS-189287_ref17","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1007\/s11036-018-1003-5","article-title":"The Individual Identification Method of Wireless Device Based on A Robust Dimensionality Reduction Model of Hybrid Feature Information","volume":"23","author":"Han","year":"2018","journal-title":"Mobile Networks & Applications"},{"issue":"01","key":"10.3233\/JIFS-189287_ref18","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1142\/S021800142059003X","article-title":"An Intelligent Security Defensive Model of SCADA Based on Multi-Agent in Oil and Gas Fields","volume":"34","author":"Yang","year":"2020","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"issue":"3","key":"10.3233\/JIFS-189287_ref19","first-page":"581","article-title":"The Role of Security Concerns in the Failure of the Annan Plan and in the Post-Annan Plan Period","volume":"5","author":"Faustman","year":"2018","journal-title":"Geoscientific Model Development"},{"issue":"8","key":"10.3233\/JIFS-189287_ref20","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1111\/risa.12966","article-title":"Security Investment in Contagious Networks","volume":"38","author":"Hasheminasab","year":"2018","journal-title":"Risk Analysis"},{"issue":"4","key":"10.3233\/JIFS-189287_ref21","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1002\/qre.2456","article-title":"Fuzzy ridgelet neural network prediction model trained by improved particle swarm algorithm for maintenance decision of polypropylene plant","volume":"35","author":"Zhao","year":"2019","journal-title":"Quality and Reliability Engineering International"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-189287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:48Z","timestamp":1777455708000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-189287"}},"subtitle":[],"editor":[{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":21,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-189287","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,4]]}}}