期刊文献+
共找到3,361篇文章
< 1 2 169 >
每页显示 20 50 100
Cutting-Edge Challenges in Communication Technology and Computer Network Security
1
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology Computer network security
下载PDF
Computer Network and Database Security Technology Optimization
2
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database security technology Optimized path
下载PDF
Reform of the Course System of Network Security Theory and Technology for Foreign Students in China
3
作者 Hu Xiong Jinhao Chen +1 位作者 Yang Zhao Zhiguang Qin 《计算机教育》 2020年第12期49-52,共4页
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the... Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures. 展开更多
关键词 theory and technology of network security REFORM education of foreign graduate students
下载PDF
A Research on the Application of Virtual Network Technology in Computer Network Security
4
作者 Kun Qi 《Journal of Electronic Research and Application》 2022年第4期1-6,共6页
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2... In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference. 展开更多
关键词 Virtual network technology Computer network security Application research
下载PDF
Using Linear Regression Analysis and Defense in Depth to Protect Networks during the Global Corona Pandemic 被引量:1
5
作者 Rodney Alexander 《Journal of Information Security》 2020年第4期261-291,共31页
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th... The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables). 展开更多
关键词 Information Assurance Defense in Depth Information technology network security CYBERsecurity Linear Regression Analysis PANDEMIC
下载PDF
Improving the Cybersecurity Framework for Future Consumer Networks
6
作者 Tyler Welker Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2021年第4期47-54,共8页
The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This can create many different pathways for cybercriminals to launch an attack on an enterprise netwo... The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This can create many different pathways for cybercriminals to launch an attack on an enterprise network to cause panic, this situation could be prevented. Using the proposed framework, network administrators and networked organizations can improve their cybersecurity framework for future consumer networks. Implementing a network security plan that is up to date and outlines responsibilities of team members, creating a government subsidy to implement and increase safeguards on US based networks, and the analyzing of past cyber-attacks metadata to further understand the attacks that are causing problems for consumer networks can improve the cybersecurity framework for consumer networks and increase potential security on US based networks. Research found that the implementation of security plans, creating a government subsidy, and analyzing past metadata all show signs of improving the framework of cybersecurity in consumer based networks. 展开更多
关键词 CYBERsecurity Information technology network security MALWARE ATTACKS
下载PDF
Using the Latin Square Design Model in the Prioritzation of Network Security Threats: A Quantitative Study
7
作者 Rodney Alexander 《Journal of Information Security》 2020年第2期92-102,共11页
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ... Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks. 展开更多
关键词 INFORMATION ASSURANCE LATIN SQUARE Design Model DEFENSE in Depth INFORMATION technology network security CYBERsecurity
下载PDF
Reducing Threats by Using Bayesian Networks to Prioritize and Combine Defense in Depth Security Measures
8
作者 Rodney Alexander 《Journal of Information Security》 2020年第3期121-137,共17页
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c... Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables). 展开更多
关键词 Information Assurance Bayesian networks Influence Diagrams Defense in Depth Information technology network security CYBERsecurity
下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
9
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER network security DATA ENCRYPTION technology application STRATEGY
下载PDF
Research on the application of artificial intelligence in the computer network technology
10
作者 Shi Yuanmin 《International English Education Research》 2014年第2期29-31,共3页
As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the rese... As the product of the mutual infiltration of the various disciplines such as the control theory, information theory, system theory, computer science, physiology, psychology, mathematics, philosophy and so on, the research field of the theory and application of artificial intelligence technology covers almost all the areas of human activity. In recent years, the rapid development of computer network technology produces and drives a batch of new scientific research fields. Among them, the application of artificial intelligence in the computer network technology is a hot topic which is academically and technically strong and can bring obvious economic benefit. 展开更多
关键词 Artificial intelligence computer network technology network security network management
下载PDF
A Practical Study of Big Data Technology in Computer Network Information Security Processing
11
作者 Kongduo Xing 《Journal of Electronic Research and Application》 2023年第6期36-41,共6页
In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network in... In recent years,China has witnessed continuous development and progress in its scientific and technological landscape,with widespread utilization of computer networks.Concurrently,issues related to computer network information security,such as information leakage and virus invasions,have become increasingly prominent.Consequently,there is a pressing need for the implementation of effective network security measures.This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing.It delves into the core concepts and characteristics of big data technology,exploring its potential as a solution.The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks.The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields,offering guidance on effective approaches to enhance computer network information security through the application of big data technology. 展开更多
关键词 Big data technology Computer network Information security
下载PDF
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
12
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key Technologies of Wireless Heterogeneous network security NODE WLAN
下载PDF
Study on Security Technologies for Wireles Network Integration
13
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 security USA WLAN NODE IEEE IPSEC Study on security Technologies for Wireles network Integration
下载PDF
Investor Relations (IR) in Business Communication on the Example of Poland
14
作者 Ryszard Kamifiski 《Journal of Modern Accounting and Auditing》 2013年第11期1483-1496,共14页
This paper focuses on investor relations (IR) as an element of companies' communication with the external environment. It shows the place and role of IR in communication with the general market, and the stock excha... This paper focuses on investor relations (IR) as an element of companies' communication with the external environment. It shows the place and role of IR in communication with the general market, and the stock exchange market in particular. The study is illustrated with an example of IR in Poland, a relatively new European Union (EU) member state and an emerging market. As can be seen, IR goes beyond the traditionally understood maintenance of communication with the capital market. It is also shown that the main role of IR ought to be the reduction of investment risk and enhancement of the companies' value, which is of particular significance in light of the current globalization of capital markets. It has been found that Polish companies, especially those listed on the Warsaw Securities Exchange (WSE), commonly rely on IR as a means of communication with the environment. And yet, as the results of the analysis show, the quality of that communication is still far from satisfactory, despite efforts undertaken by various external entities to encourage more focus on the development of IR, or understanding of the company's relevant staff of its important role. 展开更多
关键词 investor relations (IR) public relations (PR) business communication financial reporting STAKEHOLDERS capital market securities exchange/stock exchange information technologies
下载PDF
Peer-to-Peer网络中安全对等组的实现 被引量:10
15
作者 李祖鹏 赵修斌 +2 位作者 黄道颖 庄雷 黄建华 《计算机工程与应用》 CSCD 北大核心 2003年第24期51-53,59,共4页
计算机对等联网(peer-to-peernetwork,P2P)技术是目前流行于国际网络技术研究领域的一个热点,而安全问题则是P2P网络通信研究中的重要课题。通过应用JXTA技术,文章着重阐述了在P2P网络中实现安全对等组的方法及其工作机制,并在JavaTM2... 计算机对等联网(peer-to-peernetwork,P2P)技术是目前流行于国际网络技术研究领域的一个热点,而安全问题则是P2P网络通信研究中的重要课题。通过应用JXTA技术,文章着重阐述了在P2P网络中实现安全对等组的方法及其工作机制,并在JavaTM2平台上予以实现。 展开更多
关键词 计算机对等联网 JXTA技术 安全对等组 鉴权
下载PDF
IP Security协议分析及VPN建设探讨 被引量:1
16
作者 陈世清 《湖南工程学院学报(自然科学版)》 2002年第4期54-56,59,共4页
VPN是实现在公网上安全传输和私有网络信息的一种技术 .IPSec是新一代互连网安全标准。结合IPSec协议标准 ,研究基于IPSec的VPN技术及实现 ,指出IPSec在VPN安全性方面的重要作用 ,对提高网络的安全性和可靠性 。
关键词 IP security协议 VPN IPSEC协议 网络安全 虚拟专用网 隧道技术 网络建设
下载PDF
Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology 被引量:1
17
作者 Heping Pu Yijun Wang Xinke An 《Journal of Computer and Communications》 2020年第8期45-58,共14页
Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper... Based on the analysis of the security problems existing in the cloud platform of the data center, this paper proposes a set of cloud platform security protection scheme being with virtualization technology. This paper focuses on the overall architecture of cloud platform as well as the design of virtualization security architecture. Meantime, it introduces the key technologies of VXLAN in detail. The scheme realizes flexible scheduling of security resources through virtual pooling of independent security gateway and virtual machine isolation through VXLAN technology. Moreover, it guides all horizontal traffic to independent security gateway for processing, unified management of security gateway through cloud platform by using Huawei NSH business chain technology. This scheme effectively solves the horizontal transmission of security threat among virtual machines, and realizes the fine security control and protection for the campus data center. 展开更多
关键词 network security Cloud Platform Virtualization technology VXLAN Horizontal Traffic
下载PDF
经济安全治理体系的生成逻辑和实现路径 被引量:1
18
作者 郭冠清 《新疆师范大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第5期77-90,F0002,共15页
经济安全是国家安全的基础,是经济发展的前提。首先,文本从人民至上的价值观、唯物史观、科学思想方法三个层面,探索了经济安全治理体系演变的方法论基础;其次,以开放条件下社会再生产理论为依托,对经济安全治理体系生成的理论逻辑进行... 经济安全是国家安全的基础,是经济发展的前提。首先,文本从人民至上的价值观、唯物史观、科学思想方法三个层面,探索了经济安全治理体系演变的方法论基础;其次,以开放条件下社会再生产理论为依托,对经济安全治理体系生成的理论逻辑进行研究,对为什么要更好地发挥政府的作用、为什么要提高自主生产能力、为什么要提高经济增长的内生动力进行分析;再次,以经济思想史为视角,对经济安全治理理念标识性概念从统筹革命与建设的关系到统筹经济建设和国防建设的关系,再到正确处理改革发展稳定关系,最后到统筹发展和安全演化进行梳理;最后,从全面深入贯彻新发展理念和总体国家安全观、健全宏观经济治理体系、加快科技自立自强步伐、提高国内外双循环的动力和活力等方面,对如何增强经济安全性的主动权,推动经济安全治理体系和能力现代化进行分析。 展开更多
关键词 唯物史观 科学思想方法 统筹发展和安全关系 科技自立自强 增强发展安全性的主动权
下载PDF
态势感知技术在智慧校园安全中的应用研究 被引量:1
19
作者 丁铁 《湖南邮电职业技术学院学报》 2024年第2期39-43,共5页
随着网络安全等级保护制度2.0标准的实施,主动防御已成为校园网络安全防护的重要策略,进而也推动着智慧校园安全体系的建设。通过对以态势感知技术在信息资产、业务逻辑、数据采集、架构设计以及安全预警等方面的深入研究,搭建出智慧校... 随着网络安全等级保护制度2.0标准的实施,主动防御已成为校园网络安全防护的重要策略,进而也推动着智慧校园安全体系的建设。通过对以态势感知技术在信息资产、业务逻辑、数据采集、架构设计以及安全预警等方面的深入研究,搭建出智慧校园态势感知平台的应用场景,及时捕获校园网络中的漏洞或异常事件,增强对校外攻击行为的主动防御能力,为学校提供精准的网络安全态势信息,从而提高智慧校园安全状况的控制力,进而降低其安全风险,高质量实现智慧校园安全防御目标。 展开更多
关键词 态势感知技术 网络安全 应用场景
下载PDF
中国专利奖视角下的颠覆性技术识别分析 被引量:1
20
作者 施国良 吴静 +1 位作者 陈挺 张笑笑 《科技管理研究》 CSSCI 2024年第9期10-19,共10页
为充分利用专利结构化数据和文本数据,实现准确有效的颠覆性技术识别,以中国专利奖为切入点,提出基于图神经网络的颠覆性技术识别框架。首先以获得中国专利奖的授权发明专利定义颠覆性技术,解决技术定义难的问题;接着使用Neo4j图数据库... 为充分利用专利结构化数据和文本数据,实现准确有效的颠覆性技术识别,以中国专利奖为切入点,提出基于图神经网络的颠覆性技术识别框架。首先以获得中国专利奖的授权发明专利定义颠覆性技术,解决技术定义难的问题;接着使用Neo4j图数据库构建异质有向图,存储专利多重关系数据和方向信息,解决关系数据利用率低的问题;最后使用关系图卷积神经网络(R-GCN)模型进行训练,实现颠覆性技术识别,解决识别效果不佳的问题。研究表明以获得中国专利奖的专利技术直接定义颠覆性技术是合理且可靠的;提出的颠覆性技术识别框架能充分利用专利数据信息和专利异质有向图中空间信息,识别出绝大部分的颠覆性技术,丰富了图神经网络在颠覆性技术识别方面的研究。 展开更多
关键词 颠覆性技术 中国专利奖 Neo4j图数据库 关系图卷积神经网络
下载PDF
上一页 1 2 169 下一页 到第
使用帮助 返回顶部