ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Computer Network Information Security Protection Strategy Based on Clustering Algorithms
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-43306-2_1
◽
2020
◽
pp. 3-10
Author(s):
Bingjie Liu
Keyword(s):
Information Security
◽
Computer Network
◽
Clustering Algorithms
◽
Network Information
◽
Protection Strategy
Download Full-text
Related Documents
Cited By
References
Computer Network Information Security and Protection Strategy Under the Background of Big Data
Advances in Intelligent Systems and Computing - The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy
◽
10.1007/978-3-030-62746-1_122
◽
2020
◽
pp. 787-791
Author(s):
Liu Guanxiu
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Download Full-text
Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
Proceedings of the 2016 2nd Workshop on Advanced Research and Technology in Industry Applications
◽
10.2991/wartia-16.2016.16
◽
2016
◽
Author(s):
Liang Xue
◽
Juan Yang
◽
Weiguo Fan
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Network Information
◽
Protection Strategy
Download Full-text
Protection Strategy and Assessment of Computer Network Information Security Considering Fuzzy Immune Network Algorithm
Journal of Physics Conference Series
◽
10.1088/1742-6596/1533/3/032009
◽
2020
◽
Vol 1533
◽
pp. 032009
Author(s):
BaoQing Pu
◽
JunFeng Cheng
Keyword(s):
Information Security
◽
Computer Network
◽
Immune Network
◽
Network Information
◽
Protection Strategy
◽
Network Algorithm
Download Full-text
Computer Network Information Security and Protection Strategy Based on Secure Big Data
Application of Intelligent Systems in Multi-modal Information Analytics - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-030-74811-1_112
◽
2021
◽
pp. 775-781
Author(s):
Weigang Liu
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Download Full-text
Computer Network Information Security and Protection Strategy Based on Computer Network Technology
Computer Science and Application
◽
10.12677/csa.2019.99190
◽
2019
◽
Vol 09
(09)
◽
pp. 1703-1707
Author(s):
汉杰 纪
Keyword(s):
Information Security
◽
Computer Network
◽
Network Technology
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Download Full-text
Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Based on Data mining
10.1145/3482632.3487444
◽
2021
◽
Author(s):
Mingdong He
Keyword(s):
Data Mining
◽
Information Security
◽
Computer Network
◽
Network Information
◽
Protection Strategy
◽
Evaluation Algorithm
Download Full-text
Research on Computer Network Information Security and Protection Strategy Based on Deep Learning Algorithm
2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI)
◽
10.1109/icaaci50733.2020.00046
◽
2020
◽
Author(s):
Ping Zhou
◽
Wei Zhang
Keyword(s):
Deep Learning
◽
Information Security
◽
Computer Network
◽
Learning Algorithm
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
◽
Deep Learning Algorithm
Download Full-text
Research on Computer Network Information Security and Protection Strategy in the Era of Big Data
10.1145/3482632.3484115
◽
2021
◽
Author(s):
Caihong Tang
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Download Full-text
Research on Computer Network Information Security and Its Protection Strategy Based on Secure Big Data
IOP Conference Series Materials Science and Engineering
◽
10.1088/1757-899x/740/1/012124
◽
2020
◽
Vol 740
◽
pp. 012124
Author(s):
Haiping Wang
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Network Information
◽
Protection Strategy
Download Full-text
Research on Computer Network Information Security and Protection Strategy Based on Internet of Things
2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI)
◽
10.1109/iicspi51290.2020.9332399
◽
2020
◽
Author(s):
Ying Yang
◽
Weijian Zhang
◽
Fangfang Dang
◽
Lijing Yan
◽
Huichao Liang
Keyword(s):
Information Security
◽
Internet Of Things
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close