Network Security Technology

被引:0
|
作者
Ushirozawa, S.
Baba, Y.
Matsui, M.
Itagaki, H.
机构
来源
| 1997年 / 71期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Network security architecture and technology
    Tao Wen-hua
    Tao Wen-di
    Proceedings of 2004 Chinese Control and Decision Conference, 2004, : 665 - 667
  • [2] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [3] Application Analysis of Computer Network Security Technology Based on Network Security Maintenance
    Ma, Xiang
    Lecture Notes in Electrical Engineering, 2022, 827 LNEE : 1253 - 1258
  • [4] The application and analysis of network security technology
    Wu, Na
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING, 2016, 54 : 1328 - 1331
  • [5] Situational Awareness Technology in Network Security
    Ye, Zheng-wang
    2014 2ND INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND HEALTH (ICSSH 2014), PT 4, 2014, 58 : 247 - 251
  • [6] Research of Trusted Network Security Technology
    Gan, XiaoYing
    Liu, Bin
    ADVANCES IN MECHANICAL ENGINEERING, PTS 1-3, 2011, 52-54 : 713 - +
  • [7] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [8] Analysis of Computer Network Security Technology
    Gu, Yanfeng
    Sun, Huijia
    2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 1788 - +
  • [9] Research on Wireless Network Security Technology
    Yang, Wen-jing
    Li, Zhi-yuan
    Zhou, Huai-jun
    Li, Ran
    Zhao, Hai-yan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 296 - 299
  • [10] Applications of Visualization Technology for Network Security
    Tang Haina
    Han Chunjing
    Ge Jingguo
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1038 - 1042