共 50 条
- [31] Social network security using genetic algorithm [J]. EVOLVING SYSTEMS, 2023, 14 (02) : 175 - 190
- [32] The Application of Computer and Network Information Technology in Physical Education [J]. 2ND INTERNATIONAL CONFERENCE ON SIMULATION AND MODELING METHODOLOGIES, TECHNOLOGIES AND APPLICATIONS (SMTA 2015), 2015, : 877 - 880
- [35] The Application of Data Encryption Technology in Computer Network Communication Security [J]. 2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834
- [36] COMPUTER NETWORK OPTIMIZATION USING GENETIC ALGORITHM [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 245 - 250
- [37] Application of computer network security technology for electric power system [J]. ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 187 - 190
- [39] The Application of Network Anomaly Mining Technology in Campus Network Information Security [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1793 - 1796
- [40] The Application of Data Mining Technology in Network Security Management [J]. 2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 145 - 148