Meta-analysis of network information security and Web data mining techniques

被引:0
|
作者
Wu, Dongling [1 ]
Shan, Shaolong [1 ]
机构
[1] Tangshan Vocat & Tech Coll, Tangshan, Peoples R China
关键词
Network Information security; Data mining; Scarcity defence model;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the development of network economy, network and information security has become an important factor in the further development of the network economy. Web data mining technology is a key technology to enhance the performance of network information security. It can effectively improve network and information security. Based on this, we study Meta-analysis of network information security and Web data mining techniques deeply.
引用
收藏
页码:1974 / 1977
页数:4
相关论文
共 50 条
  • [41] Network Meta-Analysis Techniques for Synthesizing Prevention Science Evidence
    G Seitidis
    S Nikolakopoulos
    EA Hennessy
    EE Tanner-Smith
    D Mavridis
    [J]. Prevention Science, 2022, 23 : 415 - 424
  • [42] Network Meta-Analysis Techniques for Synthesizing Prevention Science Evidence
    Seitidis, G.
    Nikolakopoulos, S.
    Hennessy, E. A.
    Tanner-Smith, E. E.
    Mavridis, D.
    [J]. PREVENTION SCIENCE, 2022, 23 (03) : 415 - 424
  • [43] Social network information security and artificial intelligence privacy protection based on data mining
    Wang, Yanhui
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [44] Monitoring Research of Network Security Information System Based on Rough Set Data Mining
    Chen, Minfeng
    [J]. SCIENTIFIC PROGRAMMING, 2022, 2022
  • [45] A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
    Trang, Simon
    Brendel, Benedikt
    [J]. INFORMATION SYSTEMS FRONTIERS, 2019, 21 (06) : 1265 - 1284
  • [46] A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research
    Simon Trang
    Benedikt Brendel
    [J]. Information Systems Frontiers, 2019, 21 : 1265 - 1284
  • [47] A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (01) : 26 - 46
  • [48] Mining Information on Bitcoin Network Data
    Zhu, Jiawei
    Liu, Peipeng
    He, Longtao
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 999 - 1003
  • [49] NETWORK META-ANALYSIS OF INDIVIDUAL AND AGGREGATE LEVEL DATA
    Jansen, J. P.
    Cope, S.
    [J]. VALUE IN HEALTH, 2012, 15 (04) : A159 - A159
  • [50] Network meta-analysis of individual and aggregate level data
    Jansen, Jeroen P.
    [J]. RESEARCH SYNTHESIS METHODS, 2012, 3 (02) : 177 - 190