Computer Network Security Technology Based on Java

被引:0
|
作者
机构
[1] Gao, Qi
[2] Bai, Jinniu
关键词
Computer network security - Computer technology - [!text type='Java']Java[!/text] programming - [!text type='Java']Java[!/text] technologies - Network information securities - Network security technology - Network technologies - Networks security - Technology-based - Virus infection;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] The application of data mining technology in computer network security
    Ma Xiao-li
    Zhang Xiao-lei
    2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 1126 - 1129
  • [32] Discussion on the Utilization of Prevention Technology of Computer Network Security
    Zhai Changhong
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5523 - 5525
  • [33] How computer security works - The java']java sandbox
    Gosling, J
    SCIENTIFIC AMERICAN, 1998, 279 (04) : 109 - 109
  • [34] The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology
    Huang, Xin
    Wan, Rongze
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 185 - 196
  • [35] Design and implementation of computer network security protection system based on artificial intelligence technology
    Liu, Cheng
    APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023, 8 (02) : 1491 - 1508
  • [36] Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology
    Zheng, Xiaokun
    ADVANCES IN MULTIMEDIA, 2022, 2022
  • [37] Application of the Data Encryption Technology in the Computer Network Communication Security
    Hu, Xiaoling
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 126 : 283 - 283
  • [38] Experimental Teaching Research and Practice of "Computer Network Security Technology"
    Peng Hehuan
    Wei Li
    Ran Xinxia
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 610 - 612
  • [39] The research on Data Flow Technology in Computer Network Security Monitoring
    Yin XiaoHong
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 787 - 789
  • [40] The Application of Data Encryption Technology in Computer Network Communication Security
    Gong, Lina
    Zhang, Li
    Zhang, Wei
    Li, Xuhong
    Wang, Xia
    Pan, Wenwen
    2017 5TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2017), 2017, 1834