Meta-analysis of network information security and Web data mining techniques

被引:0
|
作者
Wu, Dongling [1 ]
Shan, Shaolong [1 ]
机构
[1] Tangshan Vocat & Tech Coll, Tangshan, Peoples R China
关键词
Network Information security; Data mining; Scarcity defence model;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the development of network economy, network and information security has become an important factor in the further development of the network economy. Web data mining technology is a key technology to enhance the performance of network information security. It can effectively improve network and information security. Based on this, we study Meta-analysis of network information security and Web data mining techniques deeply.
引用
收藏
页码:1974 / 1977
页数:4
相关论文
共 50 条
  • [21] Applications and techniques in information and network security
    Abawajy, Jemal H.
    Islam, Rafiqul
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [22] Applying data mining techniques in intrusion detection system on web and analysis of web usage
    Al-Ahliyya Amman University, Amman, Jordan
    不详
    [J]. Inf. Technol. J, 2006, 1 (57-63):
  • [23] Network Meta-Analysis of Carotid Endarterectomy Closure Techniques
    Lazarides, Miltos K.
    Christaina, Eleni
    Argyriou, Christos
    Georgakarakos, Efstratios
    Tripsianis, Gregory
    Georgiadis, George S.
    [J]. EUROPEAN JOURNAL OF VASCULAR AND ENDOVASCULAR SURGERY, 2021, 61 (02) : 181 - 190
  • [24] REVASCULARIZATION TECHNIQUES IN DIABETICS - A (NETWORK) META-ANALYSIS IN PROGRESS
    Tu, B.
    Rich, B.
    Brophy, J.
    [J]. CANADIAN JOURNAL OF CARDIOLOGY, 2013, 29 (10) : S282 - S283
  • [25] Research Techniques Made Simple: Network Meta-Analysis
    Watt, Jennifer
    Tricco, Andrea C.
    Straus, Sharon
    Veroniki, Areti Angeliki
    Naglie, Gary
    Drucker, Aaron M.
    [J]. JOURNAL OF INVESTIGATIVE DERMATOLOGY, 2019, 139 (01) : 4 - +
  • [26] Information Security in Big Data: Privacy and Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Wang, Jian
    Yuan, Jian
    Ren, Yong
    [J]. IEEE ACCESS, 2014, 2 : 1149 - 1176
  • [27] Analysis techniques for information security
    Datta, Anupam
    Jha, Somesh
    Li, Ninghui
    Melski, David
    Reps, Thomas
    [J]. Synthesis Lectures on Information Security, Privacy, and Trust, 2010, 2 (01): : 1 - 164
  • [28] The Integrating Between Web Usage Mining and Data Mining Techniques
    Nassar, Omer Adel
    Al Saiyd, Nedhal A.
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 243 - 247
  • [29] Implementation of data mining techniques in web of things
    Vihari, G.
    Prasad, N.
    Satyanarayan, K.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [30] Data Mining Techniques for Web Page Classification
    Fiol-Roig, Gabriel
    Miro-Julia, Margaret
    Herraiz, Eduardo
    [J]. HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS, 2011, 89 : 61 - 68