Otwarty dostęp

Research on Computer Network Security Protection Technology Incorporating Full Convolutional Networks


Zacytuj

Ayd NMA, Zaim, A. H., Ceylan, K. G. (2019). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), 517-526. Search in Google Scholar

Gang, Q. U., Shaobo, J. I., Min, Q. (2018). Inter-Organizational Coordination, IT Support, and Environment. Tsinghua Science & Technology, 13(003), 374-382. Search in Google Scholar

Wang, D,. Jie, J. (2015). Big Data Era of Computer Network Information Security and Protection Strategy Study. Wireless Internet Technology. Search in Google Scholar

Li, X. (2018). Design and implementation of network information security monitoring system. Network Security Technology & Application. Search in Google Scholar

Wei, Y. H. (2016). The discussion of Network information security defensive system. Journal of the Hebei Academy of Sciences. Search in Google Scholar

Zhang, Y. (2018). Research on Computer Network Information Security Protection Strategy. Computer Knowledge and Technology. Search in Google Scholar

Shan, Z., Wang, Q., Meng, X. (2017). An OS Security Protection Model for Defeating Attacks from Network. Search in Google Scholar

Luo, T. (2016). Brief Analysis of Network Security and Protection Technology. Computer Knowledge and Technology(Academic Exchange). Search in Google Scholar

Chen, S. (2021). Network Security Protection Technology under the Background of Computing Big Data. Journal of Physics: Conference Series, 1982(1), 012207 (9pp). Search in Google Scholar

Yang, J. (2019). The computer network security protection measures and safety specification analysis. Network Security Technology & Application. Search in Google Scholar

Long, Z., Wei, L., Liang, Z., et al. (2018). Study on protection strategy and evaluation algorithm of computer network information security. Modern Electronics Technique. Search in Google Scholar

Sun, Y., Ke, J., Wang, Y. (2017). A Network Security Protection Research for Industrial Control System. Journal of Information Security Research. Search in Google Scholar

Yin, X. D. (2015). The Construction of Wireless Network Security Protection System. Sci-Tech Information Development & Economy. Search in Google Scholar

Rui-Qing, H. U., Tian, J. R. (2018). Some Thoughts About Network Security and Protection. Computer Knowledge and Technology. Search in Google Scholar

Li, H. J., Xiang, W. (2016). Research on Information Security Analysis and Protection Strategy of Computer Network. Information Security and Technology. Search in Google Scholar

Zhang, S. P. (2018). On Computer Network Information Security and Protection Strategy. Computer Knowledge and Technology. Search in Google Scholar

Liu, S. F. (2017). On the Status of Network Information Security and the Protection Strategy. Development & Innovation of Machinery & Electrical Products. Search in Google Scholar

Dai, T. H., Prof, A. (2016). Intrusive Detection Based on Genetic Neural Networks. China Safety Science Journal(CSSJ). Search in Google Scholar

Song, P. (2017). Computer Network Security Protection Technology Analysis. Computer & Telecommunication. Search in Google Scholar

eISSN:
2444-8656
Język:
Angielski
Częstotliwość wydawania:
Volume Open
Dziedziny czasopisma:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics