Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Computer Network Security Management of Data Encryption TechnologySun, Caiping ; Wang, Weijiang Hashmi, Mohammad Farukh ; Mohammad Farukh HashmiWireless communications and mobile computing, 2022-09, Vol.2022, p.1-9 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Application of Information Encryption Technology in Computer Network Communication SecurityZhang, Hongbo Nagaraj, Balakrishnan ; Balakrishnan NagarajWireless communications and mobile computing, 2022-08, Vol.2022, p.1-7 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Data Encryption Technology Analysis of Robot Computer Network InformationShi, Qiaolian ; Liu, Yan Lv, Haibin ; Haibin LvJournal of sensors, 2022-07, Vol.2022, p.1-7 [Periódico revisado por pares]New York: HindawiTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Encryption Technology for Computer Network Data Security ProtectionYu, Yang Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-08, Vol.2022, p.1-9 [Periódico revisado por pares]London: HindawiTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Library Personalized Service System Based on Computer Network TechnologySong, Zhixiang ; Dang, Lingwei Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-05, Vol.2022, p.1-6 [Periódico revisado por pares]London: HindawiTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Application of Data Encryption Technology in Computer Network Information SecurityLi, Lifeng Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-08, Vol.2022, p.1-8 [Periódico revisado por pares]London: HindawiTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Recognition and Detection Methods of Artificial Intelligence in Computer Network Faults under the Background of Big DataGe, Meng A Saeed, Rashid ; Rashid A SaeedWireless communications and mobile computing, 2022-05, Vol.2022, p.1-13 [Periódico revisado por pares]Oxford: HindawiTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Computer Network Information Security Monitoring System Based on Big Data EraSun, Yu ; Liu, Xiaorong ; Shen, Xiaoli Khan, Mohammad Ayoub ; Mohammad Ayoub KhanSecurity and communication networks, 2022-11, Vol.2022, p.1-11 [Periódico revisado por pares]London: HindawiTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Performance Test and Improvement of Computer Network Virtualization Software in Cloud Computing EnvironmentLiu, Wei Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-08, Vol.2022, p.1-7 [Periódico revisado por pares]London: HindawiTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Application Research of Data Encryption Technology in Computer Network Information SecurityWang, Meilin Venkatesan, C. ; C VenkatesanSecurity and communication networks, 2022-09, Vol.2022, p.1-7 [Periódico revisado por pares]London: HindawiTexto completo disponível |