This work is licensed under the Creative Commons Attribution 4.0 International License.
Ayd NMA, Zaim, A. H., Ceylan, K. G. (2019). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), 517-526.Search in Google Scholar
Gang, Q. U., Shaobo, J. I., Min, Q. (2018). Inter-Organizational Coordination, IT Support, and Environment. Tsinghua Science & Technology, 13(003), 374-382.Search in Google Scholar
Wang, D,. Jie, J. (2015). Big Data Era of Computer Network Information Security and Protection Strategy Study. Wireless Internet Technology.Search in Google Scholar
Li, X. (2018). Design and implementation of network information security monitoring system. Network Security Technology & Application.Search in Google Scholar
Wei, Y. H. (2016). The discussion of Network information security defensive system. Journal of the Hebei Academy of Sciences.Search in Google Scholar
Zhang, Y. (2018). Research on Computer Network Information Security Protection Strategy. Computer Knowledge and Technology.Search in Google Scholar
Shan, Z., Wang, Q., Meng, X. (2017). An OS Security Protection Model for Defeating Attacks from Network.Search in Google Scholar
Luo, T. (2016). Brief Analysis of Network Security and Protection Technology. Computer Knowledge and Technology(Academic Exchange).Search in Google Scholar
Chen, S. (2021). Network Security Protection Technology under the Background of Computing Big Data. Journal of Physics: Conference Series, 1982(1), 012207 (9pp).Search in Google Scholar
Yang, J. (2019). The computer network security protection measures and safety specification analysis. Network Security Technology & Application.Search in Google Scholar
Long, Z., Wei, L., Liang, Z., et al. (2018). Study on protection strategy and evaluation algorithm of computer network information security. Modern Electronics Technique.Search in Google Scholar
Sun, Y., Ke, J., Wang, Y. (2017). A Network Security Protection Research for Industrial Control System. Journal of Information Security Research.Search in Google Scholar
Yin, X. D. (2015). The Construction of Wireless Network Security Protection System. Sci-Tech Information Development & Economy.Search in Google Scholar
Rui-Qing, H. U., Tian, J. R. (2018). Some Thoughts About Network Security and Protection. Computer Knowledge and Technology.Search in Google Scholar
Li, H. J., Xiang, W. (2016). Research on Information Security Analysis and Protection Strategy of Computer Network. Information Security and Technology.Search in Google Scholar
Zhang, S. P. (2018). On Computer Network Information Security and Protection Strategy. Computer Knowledge and Technology.Search in Google Scholar
Liu, S. F. (2017). On the Status of Network Information Security and the Protection Strategy. Development & Innovation of Machinery & Electrical Products.Search in Google Scholar
Dai, T. H., Prof, A. (2016). Intrusive Detection Based on Genetic Neural Networks. China Safety Science Journal(CSSJ).Search in Google Scholar
Song, P. (2017). Computer Network Security Protection Technology Analysis. Computer & Telecommunication.Search in Google Scholar