Vajjha H , Sushma P . Techniques and Limitations in
Securing the Log Files to Enhance Network Security
and Monitoring[J]. Solid State Technology, 2021,
64(2):1-8.
Tang C , Zhang J , Wang S , et al. Application and
Implementation of Big Data Visualization Technology
in Network Security System[J]. Journal of Physics:
Conference Series, 2021, 1955(1):012002 (6pp).
Al-Haija Q A , Ishtaiwi A . Multi-Class Classification of
Firewall Log Files Using Shallow Neural Network for
Network Security Applications[J]. Advances in
Intelligent Systems and Computing, 2021,
1370(1):1-15.
Zhi W W , Zhou X X , Yang L . Application of Fuzzy
Comprehensive Method and Analytic Hierarchy
Process in the Evaluation of Network Security Level
Protection Research[J]. Journal of Physics: Conference
Series, 2021, 1820(1):012187 (8pp).
Li S . Development Trend of Computer Network Security
Technology Based on the Big Data Era[J]. Journal of
Physics Conference Series, 2021, 1744(4):042223.
Li J , Yan L , Wang J , et al. Research on Network Security
Risk Assessment Method Based on Improved AHP[J].
Journal of Physics: Conference Series, 2021,
1828(1):012115 (14pp).
Wang M , Zhang B . Analysis of Internet of Things
Computer Network Security and Remote Control
Technology[J]. IOP Conference Series: Earth and
Environmental Science, 2021, 634(1):012035 (6pp).
Wang D , Fan H , Li G , et al. Research on Real-time
Crawling and Marking Technology of Sensitive Access
SQL Statements Based on Information Network
Security Isolation Device[J]. Journal of Physics
Conference Series, 2021, 1948(1):012059.
Huang J , Li J , Wang J , et al. Information Hiding
Technology under the Background of Power System
Network Security[J]. Journal of Physics: Conference
Series, 2021, 1852(2):022064 (7pp).
Chao H C , Wu H T , Tseng F H.AIS Meets IoT: A
Network Security Mechanism of Sustainable Marine
Resource Based on Edge Computing[J]. Sustainability,
2021, 13(6):3048.
Einy S , Oz C , Navaei Y D.The Anomaly- and
Signature-Based IDS for Network Security Using
Hybrid Inference Systems[J]. Mathematical Problems
in Engineering, 2021, 2021(9):1-10.
Yuan T , Niu Y , Lv L.Research on Optimization Strategy
of Computer Network Security Technology under the
Background of Big Data Era[J]. Journal of Physics:
Conference Series, 2021, 1744(3):032237 (4pp).
Zhang N . Research on the Application of Data Encryption
Technology Based on Network Security Maintenance
in Computer Network Security[J]. Journal of Physics
Conference Series, 2021, 1744(2):022060.
Ma J , Yu G , Ke H , et al. Network Security Management
and Protection of Industrial Internet Equipment[J].
Chinese Journal of Engineering Science, 2021,
23(2):81.
Li R , Li F , Wu C , et al. Research on Vehicle Network
Security Situation Prediction Based on Improved
CLPSO-RBF[J]. Journal of Physics: Conference Series,
2021, 1757(1):012148 (8pp).
Zhang H , Kang C , Xiao Y.Research on Network Security
Situation Awareness Based on the LSTM-DT
Model[J].Sensors, 2021, 21(14):4788.
Melad T.Data Network Security Over The Horizon
Radar[J]. International Journal of Scientific and
Research Publications (IJSRP), 2021, 11(7):730-746.
Humayun M , Hamid B , Jhanjhi N Z , et al. 5G Network
Security Issues, Challenges, Opportunities and Future
Directions: A Survey[J]. Journal of Physics Conference
Series, 2021, 1979(1):012037.
Jiang L.On the Relationship between Computer Firewall
Technology and Network Security[J]. Journal of
Physics Conference Series, 2021, 1744(3):032137.
Ni Z , Zhao F.Research and Implementation of Network
Security Management Based on Virtualization
Technology[J]. Journal of Physics Conference Series,
2021, 1802(4):042070.
Zhang Q , Ma D. Discussion on Network Security of
Information Retrieval Technology in Network
Communication[J]. Journal of Physics: Conference
Series, 2021, 1744(3):032200 (6pp).
Fang W , Zhao R , Zhu D.Study on Sparrow Search
Algorithm Based on K-Means Clustering[J]. Computer
Simulation, 2022, 39(9): 403-409.