Research on Network Security and Data Encryption

被引:0
作者
Duan, Zhongqi [1 ]
Xue, Xiaofeng [2 ]
机构
[1] Changzhou Univ, Sch Informat Sci & Engn, Changzhou, Peoples R China
[2] Jiangsu Teachers Univ Technol, Sch Comp Engn, Changzhou, Peoples R China
来源
INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2 | 2011年 / 50-51卷
关键词
network security; access control; data encryption; network firewall;
D O I
10.4028/www.scientific.net/AMM.50-51.531
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In the old days of the mainframe, information was centralized so security was not as big an issue. Nowadays, with the advent of information being distributed across many servers located in different areas, security is a major concern. Protecting the information is a high priority. A network with a good accounting and auditing system will ensure that all activities are logged, thereby enabling malicious activity to be detected.
引用
收藏
页码:531 / +
页数:2
相关论文
共 50 条
[41]   Computer Network Security and Technology Research [J].
Fan Yan ;
Yang Jian-wen ;
Cheng Lin .
2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, :293-296
[42]   Research on security resilient network systems [J].
Li, ZH ;
Li, WH ;
Zhang, L .
CONCURRENT ENGINEERING: THE WORLDWIDE ENGINEERING GRID, PROCEEDINGS, 2004, :45-49
[43]   Research of network security and firewalls techniques [J].
Yang, QX .
ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, :8083-8085
[44]   Research on Key Technology Algorithms of Communication Network Intrusion Detection and Data Encryption Based on Artificial Intelligence [J].
Cai, Wei ;
Ye, Yingze .
TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2025, 32 (03) :1000-1009
[45]   Research on Network Defense Graph Model in Network Security [J].
Qi, Feng ;
Xu, Haili .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11) :23-32
[46]   Research on the Application of Computer Information Technology in Network Security under the Background of "Big Data" [J].
Ying, Liu .
2018 7TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE (ICAMCS 2018), 2019, :210-214
[47]   Research on AI security enhanced encryption algorithm of autonomous IoT systems [J].
Li, Bin ;
Feng, Yuhao ;
Xiong, Zenggang ;
Yang, Weidong ;
Liu, Gang .
INFORMATION SCIENCES, 2021, 575 :379-398
[48]   Data Security Encryption Analysis Based on Blockchain Trusted Big Data Artificial Intelligence [J].
Wang, Hongwu ;
Cui, Hua ;
Zhang, Yan .
Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
[49]   Research into the Network Security Model Blended of Data Stream Mining and Intrusion Detection System [J].
Zhu Lin ;
Zhu Can-Shi .
PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, :496-499
[50]   Research on UAV Network System Security Risk Evaluation Oriented to Geographic Information Data [J].
Liu, Shaogang ;
Chen, Jiangli ;
Hong, Guihua ;
Cao, Lizhu ;
Wu, Ming .
2022 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, BIG DATA AND ALGORITHMS (EEBDA), 2022, :57-60