Professional Documents
Culture Documents
References
1.Xie Bo, "Analysis of the application of artificial intelligence technology in the information
management of archives [J / OL]", Electromechanical Engineering Technology, no. 11, pp. 40-
42, 2019.
2.Tao Tao, "Computer network security and preventive measures in the era of big data [J / OL]",
Science and Technology Innovation Herald, pp. 1-2.
4.Wu Di, "Computer network security and preventive measures in the era of big data [J / OL]",
Electronic Technology and Software Engineering, no. 22, pp. 203-204, 2019.
5.Wang Jiajun, Zhang Yun, Huang Li, Li Bo and Huang Lijin, "Research on computer network
system port scanning and dangerous port closing method [J]", Electromechanical Information,
no. 33, pp. 99-100, 2019.
6.He Zaiping, "On the main hidden dangers and management methods of computer network
security [J]", Science and Technology, no. 32, pp. 102, 2019.
7.Chang Weidong, "Research on computer network information security and protective measures
in the era of big data [J]", China Management Informationization, vol. 22, no. 22, pp. 155-156,
2019.
Authors
Bao Junyan
3.
A.Attar and S.Hazelhurst. Fast packet filtering using n-ary decision diagrams. 2002. Technical
Report, School of Computer Sciene, University of the Witwatersrand.
4.D. Antoš. Hardware-constrained Packet Classification. PhD thesis, Masaryk University, 2006.
Jaroslav Rab
Petr Matousek
Ondrej Rysavy
Miroslav Sveda
Xiao-Si Wang
Ian Herwono
Francesco Di Cerbo
Paul Kearney
Mark Shackleton
7.P. Naur and B. Randell, (Eds.). Software Engineering: Report of a conference sponsored by the
NATO Science Committee, Garmisch, Germany, 7-11 Oct. 1968, Brussels, Scientific Affairs
Division, NATO (1969) 231pp.
8.Asoke K Talukder and Manish Chaitanya, Architecting Secure Software Systems, Auerbach
Publications, 2008.
Asoke K. Talukder
Babu G. Santhosh
Ebenezer Jangam
Sekhar V. Muni
K. P. Jevitha
Samanta Saurabh
10. Jian-Qiang Zhai, Jun-Feng Tian, Rui-Zhong Du, Jian-Cai Huang, "Network Intrution Early
Warning Model Based on D-S Evidence Theory," Proceedings of the Second International
Conference on Machine Learning and Cybernetics, Xi'an, 2-5 November 2003.
Guangjuan Lv
Ruzhi Xu
Xiangrong Zu
Liwu Deng
11. Renaud Bidou, "Security Operation Center Concepts & Implementation", August 2005.
12. Jian_Qiang Zhai, Jun_Feng Tian, Rui_Zhong Du and Jian_Cai Huang, "Network Intrution
Early Warning Model Based on D-S Evidence Theory", Proceedings of the Second International
Conference on Machine Learning and Cybernetics, pp. 1972-1977, 2–5 November 2003.
Kunlun Gao
Jianming Liu
Jian Guo
Rui An
7.Network Security Monitoring
1.
IANA http://www.iana.org/assignments/port-numbers
2.
Kang H J, Kim M S, Hong J W-K, A Method on Multimedia Service Traffic Monitoring and
Analysis. In DSOM 2003. Heidelgerg, Germany Oct.2003. 93-105
3.
Thomas Karagiannis, Andre Borido, Michalis Faloutsos and Kc claffy. Transport Layer
Identification of P2P Traffic. In IMC'04, New York, NY ,USA, 2004. ACM Press 121-134
(Pubitemid 40372037)
4.
5.
Zhenbiao Lin
Xingyuan Chen
Yongwei Wang
J. Smart
17. Che Hui, "Design of smart security community system based on Internet of things [J]",
Radio and television network, vol. 28, no. 1, pp. 41-44, 2021.
18. Zhu Ge, Mei Jun and Tao Fu Ling, "Research and design of intelligent security system for
Middle Route Project of South to North Water Diversion [J]", People's Yellow River, vol. 42, no.
12, pp. 119-122134, 2020.
Xinyu Sun
Rui Liu
Yangshuo Zhang
XiaoHong Yin
21. Tu Xu-yen, Large system1 cybernetics., Beijing:National Defence Industry Press, 2002.
22. Zhang Hong-qi, Information network security, Beijing:Tsinghua University Press, 2002.
Yu Wang
Jun Lu
Zhongwang Wu
Yu Lu
23. ZHANG Haixia, WU Jianying, HUANG Kezhen et al., "Research on Data Fusion
Technology for Network Security [J]", Software Engineering and Application, vol. 10, no. 2, pp.
7, 2021.
24. W Zhi, X Zhou and L. Yang, "Application of Fuzzy Comprehensive Method and Analytic
Hierarchy Process in the Evaluation of Network Security Level Protection Research[J]", Journal
of Physics: Conference Series, vol. 1820, no. 1, pp.
Yun Kai
Huang Qiang
Ma Yixuan
25. N. McKeown, "Software-defined networking", INFOCOM keynote talk, vol. 17, no. 2, pp.
30-32, 2009.
26. N. McKeown et al., "OpenFlow: enabling innovation in campus networks", ACM SIGCOMM
Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.
Mingren Sheng
Hongri Liu
Xu Yang
Wei Wang
Junheng Huang
Bailing Wang
Zhihua Chen
29. P.I Antsaklis, "Neural networks for control systems" in Neural Networkl, IEEE Press,
Location, vol. 6, pp. 242-244, 1990.
30. Qian Li and Shuqing Wang, "Fast algorithm for adaptive generalized predictive control based
on BP neural networks", Proceedings of 2004 International Conference on Machine Learning
and Cybernetics, vol. 2, pp. 738-743, 2004.
Jing Li
Chunbo Dong
31. YuNing Wang, "Current Situation and Defense of Network Information Security[J]",
Modern Commerce Industry, 2008.
32. DongHui Jiang, "Security Offense and Defense Testing and Analysis of LAN[J]",
Science&Technology Information, 2009.
Wu Kehe
Zhang Tong
Li Wei
Ma Gang
33. Chen XZ, Zheng QH, Guan XH, Lin CG. Quantitative Hierarchical Threat Evaluation Model
for Network Security. Journal of Software, 2006,17(4):885-897
34. Bass T. Intrusion systems and multisensor data fusion: Creating cyberspace situational
awareness. Communications of the ACM, 2000,43(4):99 -105.
Liu Mixia
Yu Dongmei
Zhang Qiuyu
Zhu Honglei
35. The Information Technology Security Evaluation Criteria (ITSEC), Version 1, May 2 1990.
R. Ward
P. Skeffington
19.Analysis of Computer Network Security Technology and
37. Zhao Yuqing, "Analysis on Network Security Technology of Computer Laboratory for Cloud
Computing[J]", Network security technology and application, no. 11, pp. 90-91, 2020.
38. Xie Jinglu, "Application and optimization analysis of computer network security protection
technology under the background of information age[J]", China Computer & Communication,
vol. 32, no. 13, pp. 182-183, 2020.
Bin Ge
Jin Xu
39. Q. Zhang, H. Li and J. Hu, "A study on security framework against advanced persistent
threat", IEEE International Conference on Electronics Information & Emergency
Communication, pp. 128-131, 2017.
40. C. Cinar, M. Alkan, M. Dorterler and I. Dogru, "A Study on Advanced Persistent Threat",
International Conference on Computer Science and Engineering (UBMK), pp. 116-121, 2018.
Jundan Hou
Xiang Jia
Peng Shuanghe, Han Zhen and Shen Changxiang, "Security Protocol and Scheme for Inter-
Realm Information Accessing", Journal of Computer Research and Development, vol. 42, pp.
1587-1593, September 2005.
42.
Liu Quan, "Security Domain Research of Networked Control System", Control & Automation,
vol. 12, pp. 45-47, July 2006.
Yan Hui
Han Weijie
Wang Yu