-
1
Discussion on industrial Internet data security solution
Published 2022-02-01Subjects: Get full text
Article -
2
New blockchain consensus algorithm applied on healthcare industry: Proof of Visit- (POV)
Published 2025-04-01Subjects: Get full text
Article -
3
Virtualization Security, Key Issues of Public Cloud Computing Security
Published 2015-12-01Subjects: “…public cloud;virtualization security;data security…”
Get full text
Article -
4
Research on data encryption system and technology for cloud storage
Published 2020-08-01Subjects: Get full text
Article -
5
Research on the Entered Business Model of Telecom Customer Behavior Tagged Data
Published 2013-11-01Subjects: Get full text
Article -
6
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification
Published 2025-04-01Subjects: Get full text
Article -
7
Research on Big Data Application for Security
Published 2015-07-01Subjects: “…big data;security;graphics processing unit…”
Get full text
Article -
8
Data security and protection techniques in big data:a survey
Published 2016-04-01Subjects: Get full text
Article -
9
Research on data encryption system and technology for cloud storage
Published 2020-08-01Subjects: “…cloud security;data security;data encryption…”
Get full text
Article -
10
Application of security analysis technology for network big data
Published 2017-03-01Subjects: “…big data;security analysis;attack detection…”
Get full text
Article -
11
Research on the optimization of environmental governance pathways under the background of ecological environment big data
Published 2025-03-01Subjects: Get full text
Article -
12
Securing Text Messages Using Graph Theory and Steganography
Published 2022-02-01Subjects: “…graph theory , data security , text hiding and encryption…”
Get full text
Article -
13
Research on Information Security Mechanism Used in Network Video Surveillance System
Published 2013-08-01Subjects: Get full text
Article -
14
-
15
Secure data sharing technology of medical privacy data in the Web 3.0
Published 2024-12-01Subjects: Get full text
Article -
16
-
17
Research on the optimization of environmental governance pathways under the background of ecological environment big data
Published 2025-03-01Subjects: Get full text
Article -
18
Enhancing data security and protection in marketing: a comparative analysis of Golang and PHP approaches
Published 2023-11-01Subjects: “…data security…”
Get full text
Article -
19
Multiplexed Internet of Things Data Transmission and Visualization Utilizing Wireless LAN Authentication and Privacy Infrastructure Protocol in Smart Factories
Published 2025-05-01Subjects: “…data security transmission…”
Get full text
Article -
20
ANALISIS PERILAKU KONSUMSI PADA MARKETPLACE (SHOPEE & TOKOPEDIA) MENGGUNAKAN MODEL UTAUT
Published 2022-04-01Subjects: Get full text
Article