Hierarchical protection mechanism of network information based on computer security model algorithm terminal

被引:0
|
作者
Peng, Yue [1 ]
Limin, Zhao [1 ]
机构
[1] College of Management, Xinxiang Medical University, Xinxiang, Henan,453003, China
来源
关键词
Computer terminals - Network security - Computer networks - Security systems;
D O I
暂无
中图分类号
学科分类号
摘要
With the continuous development of computer communication technology, people's life, work and other aspects have undergone major changes, and have become more and more dependent on the network information. At the same time as the network information continues to increase, the increasing demand for its security has become the focus of its research. Therefore, the research and implementation of hierarchical protection mechanism for network information based on computer security model algorithm terminal was proposed. Through the construction of the computer security model, the computer terminal network information was hierarchized and protected. The experimental results show that the protection mechanism can effectively classify the network information and effectively protect the network information. © 2017 Institute of Thermomechanics CAS, v.v.i.
引用
收藏
页码:341 / 350
相关论文
共 50 条
  • [31] Protection Strategy Exploration for the Computer Network Information Security in the Big Data Age
    Xue, Liang
    Yang, Juan
    Fan, Weiguo
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 81 - 85
  • [32] Privacy Law Protection Based on the Information Security Assurance Algorithm
    Wang, Zhanjiang
    Yue, Qifeng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [33] Computer network security evaluation model based on neural network
    Li, Xinwei
    Chen, Hui
    Ariann, Bryan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (01) : 71 - 78
  • [34] The Evaluation Analysis of Computer Network Information Security based on FAHP
    Wu, Qian
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 229 - 242
  • [35] LEGAL PROVISION OF INFORMATION PROTECTION AND COMPUTER SECURITY
    SYUNTYURENKO, OV
    KOLOCHKOV, YM
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 1-ORGANIZATSIYA I METODIKA INFORMATSIONNOI RABOTY, 1993, (08): : 9 - 12
  • [36] The security and protection technology research of computer information
    Liu, Yu
    Zhou, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 90 - 94
  • [37] Study on the computer network security evaluation based on GABP algorithm
    Qiao, Xiaolin
    Boletin Tecnico/Technical Bulletin, 2017, 55 (18): : 497 - 504
  • [38] Research on Computer Network Security Technology Based on CNN Algorithm
    Wei, Zhang
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 119 - 124
  • [39] Information security of hospital computer network based on SAE deep neural network
    Li G.
    Dong Z.
    Wang Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [40] Research on the Measures of the Computer Network Security Protection
    Fu, Longsheng
    Wu, Mingzhu
    2016 ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2016), PT 3, 2016, 68 : 341 - 345