期刊文献+

影响计算机网络信息安全的主要因素与防治

Main Factors and Prevention Affecting Computer Network Information Security
下载PDF
导出
摘要 针对影响计算机网络信息安全(下文统一简称为网络安全)的四种因素网络病毒的入侵、人为使用不当、用户安全意识浅薄、黑客攻击进行分析,提出通过加强安全保护、规范操作人员的操作、提高用户安全意识、采用高等级防范技术的四项有效措施,目的是提升网络安全,确保计算机在实际运行期间的安全性与稳定性. According to the analysis of the four factors that affect computer network information security(hereinafter referred to as network security),network virus intrusion,improper human use,shallow user security awareness,and hacker attacks,it is proposed to strengthen security protection and standardize the operation of operators.Improve user security awareness,and adopt four effective measures of high-level prevention technology,the purpose is to improve network security and ensure the security and stability of the computer during actual operation.
作者 冉现娟 RAN Xian-juan(Zhengzhou Business Management School,Henan Zhengzhou 450000,China)
出处 《新一代信息技术》 2022年第5期158-160,共3页 New Generation of Information Technology
关键词 计算机 信息安全 黑客攻击 操作人员 computer information security hacker attack operator
  • 相关文献

参考文献7

二级参考文献52

  • 1DAVIES S, MOORE A. Bayesian networks for lossless dataset compression[C]//Proceeding of International Con- ference Knowledge Discovery and Data Mining. San Diego: ACM Press, 2013:387-391.
  • 2MERETAKIS D, WUTHRICH B. Extending naive bayes classifiers using long item sets[C]//Proceeding of Interna- tional Conference Knowledge Discovery and Data Mining. San Diego:ACM Press, 2013:165-174.
  • 3ESPOSITO F, MALERBA D, SEMERARO G, et al. A comparative analysis of methods for pruning decision trees [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2014,19 (5): 476-491.
  • 4LAM S L Y, LEE D L. Feature reduction for neural network based text categorization[C]//Digital Symposium Col- lection of 6th International Conference on Database System for Advanced Application. ES. 1. -: IEEE Press, 2015: 1121-1130.
  • 5CESTNIK B, BRATKO I. On estimating probabilities in tree pruning, machine learning.. EWSL-91 [C]//Kodratoff Lecture Notes in Artificial Intelligence. Berlin.. Springer, 2015 : 138-150.
  • 6ANDROUTSOPOULOS G, PALIOURAS V, KARKALETSIS G, et al. Learning to filter spare e-mail.. A compari- son of a naive Bayesian and a memory based approach[C] // Proceedings of 4th European Conference on Principles and Practice of Knowledge Discovery in Databases. London=Jerry Press, 2000: 1-13.
  • 7RASTOGI R, SHIM K. Public: A decision tree that integrates building and pruning[C]//Proceeding of 24th Inter- national Conference on Very Large Data Bases. New York: [s. n. ],2014:404-415.
  • 8于群,冯玲.基于BP神经网络的网络安全评价方法研究[J].计算机工程与设计,2008,29(8):1963-1966. 被引量:29
  • 9喻小光,陈维斌,陈荣鑫.一种数据规约的近似挖掘方法的实现[J].华侨大学学报(自然科学版),2008,29(3):370-374. 被引量:6
  • 10李玲娟,孙光辉.网络攻击图生成算法研究[J].计算机技术与发展,2010,20(10):171-175. 被引量:8

共引文献141

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部