共 50 条
- [41] Research on Computer Network Security Technology Based on the BP Neural Network [J]. 2015 SSR International Conference on Social Sciences and Information (SSR-SSI 2015), Pt 2, 2015, 11 : 581 - 584
- [42] Research on the Framework and Key Technologies of Panoramic Visualization for Smart Distribution Network [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
- [43] The New Exploring for the Key Technology of Distributed Network Security System Design [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 1874 - 1878
- [44] Research on the key technology of data security protection based on cloud computing [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69
- [45] Research on WPKI Key Technology and Application in E-Commerce Security [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 1, 2009, : 496 - 500
- [46] Research on Key Technology of Static CT Luggage Security Inspection System [J]. Yuanzineng Kexue Jishu/Atomic Energy Science and Technology, 2021, 55 (05): : 933 - 938
- [47] Research on Network Security Collaborative Defense Technology Based on Swarm Intelligence and Big Data Network Security [J]. Engineering Intelligent Systems, 2021, 29 (06): : 379 - 386
- [48] Research on Network Security Management and Protection Technology of Information System [J]. INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 1036 - 1042
- [49] Research on Computer Network Security Based on Data Encryption Technology [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 1383 - 1387
- [50] Experimental Teaching Research and Practice of "Computer Network Security Technology" [J]. PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 610 - 612