共 50 条
- [21] Analysis of Big Data Security Practices [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 264 - 267
- [22] Alarm Analysis for Nuclear Power Plant by a Functional Modeling Approach [J]. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 4780 - 4784
- [23] A Distribute Parallel Approach for Big Data Scale Optimal Power Flow with Security Constraints [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 774 - 778
- [24] Computer Network Security and Preventive Measures in the Age of Big Data [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INTELLIGENT ROBOTICS (ICMIR-2019), 2020, 166 : 438 - 442
- [25] Impact of Information Security measures on the Velocity of Big Data Infrastructures [J]. 2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 484 - 491
- [26] Network Information Security and Protection Measures in the Age of Big Data [J]. 2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 191 - 193
- [27] The accident at the Chernobyl nuclear power plant: A critical analysis of the consequences and protective measures [J]. Atomic Energy, 1997, 83 : 855 - 862
- [29] A Smart Approach using Multi-agent System for Big Data Security [J]. 2022 9TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, IOTSMS, 2022, : 75 - 81
- [30] Big data approach for effective ionic radii [J]. COMPUTER PHYSICS COMMUNICATIONS, 2019, 237 : 238 - 243