ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Computer Network Information Security and Protection Strategy Based on Secure Big Data
Application of Intelligent Systems in Multi-modal Information Analytics - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-030-74811-1_112
◽
2021
◽
pp. 775-781
Author(s):
Weigang Liu
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Related Documents
Cited By
References
Computer Network Information Security and Protection Strategy Under the Background of Big Data
Advances in Intelligent Systems and Computing - The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy
◽
10.1007/978-3-030-62746-1_122
◽
2020
◽
pp. 787-791
Author(s):
Liu Guanxiu
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Research on Computer Network Information Security and Protection Strategy in the Era of Big Data
10.1145/3482632.3484115
◽
2021
◽
Author(s):
Caihong Tang
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Analysis of Computer Network Information Security and Protection Strategy in the Era of Big Data
10.47939/et.v2i7.96
◽
2021
◽
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
Proceedings of the 2016 2nd Workshop on Advanced Research and Technology in Industry Applications
◽
10.2991/wartia-16.2016.16
◽
2016
◽
Author(s):
Liang Xue
◽
Juan Yang
◽
Weiguo Fan
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Computer Network Information Security and Protection Strategy Based on Computer Network Technology
Computer Science and Application
◽
10.12677/csa.2019.99190
◽
2019
◽
Vol 09
(09)
◽
pp. 1703-1707
Author(s):
汉杰 纪
Keyword(s):
Information Security
◽
Computer Network
◽
Network Technology
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Research on Computer Network Information Security and Protection Strategy Based on Deep Learning Algorithm
2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI)
◽
10.1109/icaaci50733.2020.00046
◽
2020
◽
Author(s):
Ping Zhou
◽
Wei Zhang
Keyword(s):
Deep Learning
◽
Information Security
◽
Computer Network
◽
Learning Algorithm
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
◽
Deep Learning Algorithm
Start Chat
Download Full-text
Research on Computer Network Information Security and Protection Countermeasure in Big Data Era
Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019) - Advances in Intelligent Systems and Computing
◽
10.1007/978-981-15-1468-5_217
◽
2020
◽
pp. 1831-1838
Author(s):
Jiyan He
◽
Yanbin He
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
Start Chat
Download Full-text
Research on Computer Network Information Security and Its Protection Strategy Based on Secure Big Data
IOP Conference Series Materials Science and Engineering
◽
10.1088/1757-899x/740/1/012124
◽
2020
◽
Vol 740
◽
pp. 012124
Author(s):
Haiping Wang
Keyword(s):
Big Data
◽
Information Security
◽
Computer Network
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Research on Computer Network Information Security and Protection Strategy Based on Internet of Things
2020 IEEE 3rd International Conference of Safe Production and Informatization (IICSPI)
◽
10.1109/iicspi51290.2020.9332399
◽
2020
◽
Author(s):
Ying Yang
◽
Weijian Zhang
◽
Fangfang Dang
◽
Lijing Yan
◽
Huichao Liang
Keyword(s):
Information Security
◽
Internet Of Things
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Analysis of computer network information security and protection strategy
Proceedings of the 2016 International Conference on Education, Management and Computing Technology (ICEMCT-16)
◽
10.2991/icemct-16.2016.263
◽
2016
◽
Author(s):
Wenye Yu
Keyword(s):
Information Security
◽
Computer Network
◽
Security And Protection
◽
Network Information
◽
Protection Strategy
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close