期刊文献+

计算机网络信息安全中防火墙技术分析 被引量:2

Analysis of Firewall Technology in Computer Network Information Security
下载PDF
导出
摘要 在信息化互联网时代,计算机网络信息安全技术成为大势所趋,其中的防火墙技术尤其为各个行业领域所关注,其针对防火墙的研究与实践运用已经相当广泛。本文中分析了计算机网络安全体系中的防火墙技术内容与功能特征,思考其安全需求内容,明确设计原则,同时提出各种安全策略。 In the era of information and internet, computer network information security technology has become the trend of the times, and firewall technology is particularly concerned by various industries. Its research and practice on firewall has been quite extensive. This paper analyzes the technical content and functional characteristics of the firewall in the computer network security system, considers its security requirements, clarifies the design principles, and puts forward various security strategies.
作者 张侃 ZHANG Kan(Shanxi Vocational University of Engineering Science and Technology,Taiyuan Shanxi 030001)
出处 《软件》 2022年第12期88-90,共3页 Software
基金 山西省教育科学“十四五”规划2022年度规划课题:基于OBE理念的计算机应用技术专业人才培养模式改革研究(GH-200259)。
关键词 防火墙技术 计算机网络信息安全 安全需求内容 安全策略 firewall technology computer network information security content of safety requirements security policy
  • 相关文献

参考文献4

二级参考文献53

  • 1陈庆章,等.基于IPsec协议的VPN穿越NAT的研究与实现[J].第二届中国互联网学术年会,2013.
  • 2Fayyad U M, Piatetsky-Shapiro G, Smith P. From data mining to knowledge discovery in databases: An Overview [G] //Advances in Knowledge Discovery and Data Mining. Berlin: Springer, 1996:1-34.
  • 3Olson D, Shi Yong. Introduction to Business Data Mining [M]. New York: McGraw Hill, 2007.
  • 4Shi Yong, Tian yingjie, Kou Gang, et al. Optimization Based Data Mining: Theory and Applications [M]. Berlin: Springer, 2011.
  • 5Shi Yong, Zhang Lingling, Tian Yingjie, et al. Intelligent Knowledge: A Study Beyond Data Mining [M]. Berlin: Springer, 2015.
  • 6Fung G. Machine learning and data mining via mathematical programming-based support vector machines [D]. Madison, Wisconsin: The University of Wisconsin, 2003.
  • 7Fung G, Mangasarian O L. Multicategory proximal Support vector machine classifiers [J]. Machine Learning, 2005, 59 (1/2) : 77-97.
  • 8Hsu C W, LinC J. A comparison of methods for multi class support vector machines [J]. IEEE Trans on Neural Networks, 2002, 13(2): 415-425.
  • 9Lingras P, Butz C. Rough set based l-v-1 and 1-v-r approaches to support vector machine multi-classification [J]. Information Sciences, 2007, 177(18) : 3782-3798.
  • 10Peng Yi, Kou Gang, Shi Yong, et al. A multi-criteria cop_vex quadratic programming model for credit data analysis [J]. Decision Support Systems, 2008, 44(4): 1016-1030.

共引文献279

同被引文献13

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部