Author:
Wang Bin,Guo Long,Xu Peng
Reference10 articles.
1. Gao, H., Wu, J., Wei, C., et al.: MADM method with interval-valued bipolar uncertain linguistic information for evaluating the computer NS. IEEE Access 7(99), 151506–151524 (2019)
2. Sadeanit, M.: Guide to computer NS, 4th edn. Comput. Rev. 59(2), 70 (2018)
3. Stojanov, Z., Dobrilovic, D., Zoric, T.: Exploring students’ experiences in using a physical laboratory for computer networks and data security. Comput. Appl. Eng. Educ. 25(2), 290–303 (2017)
4. Qi, Y.: Computer real-time location forensics method for network intrusion crimes. Int. J. NS 21(3), 530–535 (2019)
5. Zhou, Q., Luo, J.: The study on evaluation method of urban NS in the BD era. Intell. Autom. Soft Comput. 24(1), 133–138 (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The improvement of data encryption technology in computer network security;2022 International Conference on Artificial Intelligence in Everything (AIE);2022-08