1. An ism-based analysis method on the influencing factors of network security situation (nss);Xiao B.;Journal of Interconnection Networks,2022
2. Computer Network Security Technology and Prevention Strategy Analysis
3. Techniques and limitations in securing the log files to enhance network security and monitoring;Sushma P.;Solid State Technology,2021
4. Kansal L. Baqasah A. M. Alroobaea R. & Niu J. . 2022. Implementation of network information security monitoring system based on adaptive deep detection 23(9) 12-20.
5. Study of the impact of the transition from ipv4 to ipv6 based on the tunneling mechanism in mobile networks;Procedia Computer Science,2021