The protection strategy of data security based on JAVA stream filtering

被引:0
|
作者
Lin, Jian Bing [1 ]
Zou, Jin An [1 ]
机构
[1] Department of Information Engineering, Putian University, Putian, 351100,Fujian, China
关键词
Communication technologies - Communications technology - [!text type='JAVA']JAVA[!/text] - Network transmission - Protection strategy - Security protection - Socket - Stream;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1631 / 1634
相关论文
共 50 条
  • [1] The Protection Strategy of Data Security Based on JAVA']JAVA Stream Filtering
    Lin, Jianbing
    Zou, Jinan
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1631 - 1634
  • [2] Data Is a Stream: Security of Stream-Based Channels
    Fischlin, Marc
    Guenther, Felix
    Marson, Giorgia Azzurra
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 545 - 564
  • [3] Computer Network Information Security and Protection Strategy Based on Big Data Environment
    Jin, Min
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH, 2023, 16 (02)
  • [4] SOA Security Strategy Based on Cloud Immune Protection
    Chen, Hui
    2021 13TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2021), 2021, : 514 - 517
  • [5] E-commerce network security protection technology based on mixed data encryption strategy
    He, Yuan
    Ou, Liqi
    Pu, Xiaofei
    Li, Yunfei
    Zhao, Yuyuan
    International Journal of Circuits, Systems and Signal Processing, 2019, 13 : 727 - 731
  • [6] A Relevant Content Filtering Based Framework for Data Stream Summarization
    Dong, Cailing
    Agarwal, Arvind
    SOCIAL INFORMATICS, PT II, 2016, 10047 : 194 - 209
  • [7] CSRF protection in Java']JavaScript frameworks and the security of Java']JavaScript applications
    Peguero, Ksenia
    Cheng, Xiuzhen
    HIGH-CONFIDENCE COMPUTING, 2021, 1 (02):
  • [8] Security protection strategy of power terminal based on deep learning
    Cai, RongYan
    Cheng, Yong
    Jia, YongLiang
    2022 6TH INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL, ISCSIC, 2022, : 301 - 305
  • [9] A management strategy of monitor data in ICU based on data stream technology
    Tan, YS
    Wang, YB
    Li, HY
    IDEAS WORKSHOP ON MEDICAL INFORMATION SYSTEMS: THE DIGITAL HOSPITAL, PROCEEDINGS, 2005, : 163 - 169
  • [10] Security and data protection
    Stud. Health Technol. Informatics, (273-279):