Security vulnerability and encryption technology of computer information technology data under big data environment
暂无分享,去创建一个
Weijie Chen | Guodong Chen | Yanheng Zhao | Jinghua Zhang | Weijie Chen | Yanheng Zhao | Guodong Chen | Jinghua Zhang
[1] Jun Du,et al. Multimedia based intelligent network big data optimization model , 2018, Multimedia Tools and Applications.
[2] Lujie Li,et al. Application of Big Data Technology in Evaluation of Operating State of High-Pressure Hydrogenation Heat Exchanger , 2018, 2018 IEEE 4th International Conference on Computer and Communications (ICCC).
[3] Adrian Gardiner,et al. Skill Requirements in Big Data: A Content Analysis of Job Advertisements , 2018, J. Comput. Inf. Syst..
[4] Surabhi Verma,et al. An extension of the technology acceptance model in the big data analytics system implementation environment , 2018, Inf. Process. Manag..
[5] Liehuang Zhu,et al. Online and automatic identification and mining of encryption network behavior in big data environment , 2018, J. Intell. Fuzzy Syst..
[6] Feng Li,et al. Knowledge Structure and Its Impact on Knowledge Transfer in the Big Data Environment , 2018 .
[7] Hai Jiang,et al. Generic user revocation systems for attribute-based encryption in cloud storage , 2018, Frontiers of Information Technology & Electronic Engineering.
[8] Hanqing Lu,et al. Recent advances in efficient computation of deep convolutional neural networks , 2018, Frontiers of Information Technology & Electronic Engineering.