Applied Research on Security of Computer Network Technology
Abstract
References
Index Terms
- Applied Research on Security of Computer Network Technology
Recommendations
Application of Data Encryption Technology in Computer Network Security
BIC '21: Proceedings of the 2021 International Conference on Bioinformatics and Intelligent ComputingAt present, as an important tool to change people's production and life, computers have been widely used in all walks of life, showing broad application prospects. However, at the same time facing severe computer network security issues, the system is ...
A Discussion on Computer Security Technology and Security Preventive Measures
ICNSER '22: Proceedings of the 3rd International Conference on Industrial Control Network and System Engineering ResearchAlong with the development of the Internet, the network plays an increasingly important role in people's work and life. Moreover, the increasing popularity of smart devices has prompted people to get used to storing various information and data on ...
Application of Internet of Things Technology in Computer Network Security and Remote-Control Analysis
Internet of things computer network technology can not only speed up the information transmission, but also help to break the previous time and space restrictions and improve the actual work efficiency. However, in the practical application and ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Min Wu,
- Wei Lee,
- Program Chairs:
- Yiyi Zhouzhou,
- Riza Esa,
- Xiang Lee
In-Cooperation
- ACM Wuhan Chapter: ACM Wuhan Chapter
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 230Total Downloads
- Downloads (Last 12 months)6
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in