Matches in SemOpenAlex for { <https://semopenalex.org/work/W4387299696> ?p ?o ?g. }
Showing items 1 to 76 of
76
with 100 items per page.
- W4387299696 abstract "In recent years, with the rapid development of big data, the Internet of Things, artificial intelligence, 5G technology and new next-generation network technologies, network information technology is profoundly changing people's way of production and life. While internet technology brings convenience to our life and work, the ensuing network security issues such as data security, application security and system security are also becoming increasingly prominent. Therefore, network security technology, as the main means to maintain network information security, has begun to receive attention from the network security departments of various countries. From the perspective of network security governance and defense, this paper summarises the current status of network security construction and governance regulations in various countries, outlines the key technical features of firewalls, intrusion detection, data encryption and virtual private networks currently used in network security, and lays the foundation for mastering network security management technologies. Through the analysis of the current situation of network security, the challenges faced by network security in terms of hardware and software security, data security, hacker attacks and virus invasion are presented. Given the above challenges, this article gives solutions for establishing a security defense system, data management system and prediction and early warning system, to provide a reference for the construction of network information security." @default.
- W4387299696 created "2023-10-04" @default.
- W4387299696 creator A5006945148 @default.
- W4387299696 creator A5007001305 @default.
- W4387299696 creator A5031625880 @default.
- W4387299696 creator A5031729932 @default.
- W4387299696 date "2023-04-01" @default.
- W4387299696 modified "2023-10-06" @default.
- W4387299696 title "Challenges and Solutions for Network Security in the Information Age" @default.
- W4387299696 cites W3161764079 @default.
- W4387299696 cites W4210736559 @default.
- W4387299696 cites W4283272971 @default.
- W4387299696 cites W4292689250 @default.
- W4387299696 cites W4311165022 @default.
- W4387299696 cites W4312602099 @default.
- W4387299696 cites W4313329076 @default.
- W4387299696 doi "https://doi.org/10.1109/scset58950.2023.00017" @default.
- W4387299696 hasPublicationYear "2023" @default.
- W4387299696 type Work @default.
- W4387299696 citedByCount "0" @default.
- W4387299696 crossrefType "proceedings-article" @default.
- W4387299696 hasAuthorship W4387299696A5006945148 @default.
- W4387299696 hasAuthorship W4387299696A5007001305 @default.
- W4387299696 hasAuthorship W4387299696A5031625880 @default.
- W4387299696 hasAuthorship W4387299696A5031729932 @default.
- W4387299696 hasConcept C103377522 @default.
- W4387299696 hasConcept C111919701 @default.
- W4387299696 hasConcept C114869243 @default.
- W4387299696 hasConcept C117110713 @default.
- W4387299696 hasConcept C121822524 @default.
- W4387299696 hasConcept C148976360 @default.
- W4387299696 hasConcept C14982408 @default.
- W4387299696 hasConcept C182590292 @default.
- W4387299696 hasConcept C184842701 @default.
- W4387299696 hasConcept C22111027 @default.
- W4387299696 hasConcept C29983905 @default.
- W4387299696 hasConcept C38652104 @default.
- W4387299696 hasConcept C41008148 @default.
- W4387299696 hasConcept C52420254 @default.
- W4387299696 hasConcept C527648132 @default.
- W4387299696 hasConcept C79974875 @default.
- W4387299696 hasConcept C86844869 @default.
- W4387299696 hasConceptScore W4387299696C103377522 @default.
- W4387299696 hasConceptScore W4387299696C111919701 @default.
- W4387299696 hasConceptScore W4387299696C114869243 @default.
- W4387299696 hasConceptScore W4387299696C117110713 @default.
- W4387299696 hasConceptScore W4387299696C121822524 @default.
- W4387299696 hasConceptScore W4387299696C148976360 @default.
- W4387299696 hasConceptScore W4387299696C14982408 @default.
- W4387299696 hasConceptScore W4387299696C182590292 @default.
- W4387299696 hasConceptScore W4387299696C184842701 @default.
- W4387299696 hasConceptScore W4387299696C22111027 @default.
- W4387299696 hasConceptScore W4387299696C29983905 @default.
- W4387299696 hasConceptScore W4387299696C38652104 @default.
- W4387299696 hasConceptScore W4387299696C41008148 @default.
- W4387299696 hasConceptScore W4387299696C52420254 @default.
- W4387299696 hasConceptScore W4387299696C527648132 @default.
- W4387299696 hasConceptScore W4387299696C79974875 @default.
- W4387299696 hasConceptScore W4387299696C86844869 @default.
- W4387299696 hasFunder F4320335777 @default.
- W4387299696 hasLocation W43872996961 @default.
- W4387299696 hasOpenAccess W4387299696 @default.
- W4387299696 hasPrimaryLocation W43872996961 @default.
- W4387299696 hasRelatedWork W1519114293 @default.
- W4387299696 hasRelatedWork W2151761340 @default.
- W4387299696 hasRelatedWork W2183741450 @default.
- W4387299696 hasRelatedWork W2314524515 @default.
- W4387299696 hasRelatedWork W2368931217 @default.
- W4387299696 hasRelatedWork W2372674753 @default.
- W4387299696 hasRelatedWork W2373080253 @default.
- W4387299696 hasRelatedWork W2378885848 @default.
- W4387299696 hasRelatedWork W2379389012 @default.
- W4387299696 hasRelatedWork W3022883970 @default.
- W4387299696 isParatext "false" @default.
- W4387299696 isRetracted "false" @default.
- W4387299696 workType "article" @default.