Information security technology and services in network

被引:0
|
作者
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
下载
收藏
相关论文
共 50 条
  • [1] Introduction of the network and information security technology
    Zhou Yihang
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 263 - 266
  • [2] A New Technology for An Information Network of Security and Authorization
    Hirata, Kazuko
    Aoki, Hiroyuki
    ISCE: 2009 IEEE 13TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2009, : 985 - +
  • [3] NETWORK TECHNOLOGY AND INFORMATION-SERVICES - OPEN NETWORK ARCHITECTURE
    RAYMOND, KR
    PERSPECTIVES ON THE TELEPHONE INDUSTRY : THE CHALLENGE FOR THE FUTURE, 1989, : 269 - 276
  • [4] Network & Information System Security Risk Assessment Technology
    Yao Ye
    Cai Wandong
    Fang Nan
    2016 13TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2016, : 397 - 401
  • [5] Application of Computer Information Encryption Technology in Network Security
    Aimait, Aikebaier Jiang
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 32 - 34
  • [6] Research for The Management and Technology of Library Network Information Security
    Feng, Cheng
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 544 - 547
  • [7] The Application of Computer Information Management Technology in the Network Security
    Zhang, Haicheng
    Zheng, Qun
    Di, Zheng
    2016 3RD INTERNATIONAL CONFERENCE ON MANAGEMENT INNOVATION AND BUSINESS INNOVATION (ICMIBI 2016), PT 2, 2016, 58 : 747 - 751
  • [8] Study on data encryption technology in network information security
    Meng, Jianliang
    Wu, Tao
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 325 - 329
  • [9] Information under the network environment using computer information security technology
    Sun, Qing Li
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 474 - 477
  • [10] The Application of Network Anomaly Mining Technology in Campus Network Information Security
    Bin, Wang
    Zhao, Zhi-chao
    Jiang, Yong-cheng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1793 - 1796