Open Access
Issue
MATEC Web Conf.
Volume 309, 2020
2019 International Conference on Computer Science Communication and Network Security (CSCNS2019)
Article Number 03018
Number of page(s) 5
Section Smart Algorithms and Recognition
DOI https://doi.org/10.1051/matecconf/202030903018
Published online 04 March 2020
  1. Zhang Yi-Li. Analysis of information security protection in the era of big data. National business sentiment (economic theory research), 2016 (3), 107–108. [Google Scholar]
  2. Li Heng. Research on information security in the age of big data. Tax payment, 2017 (36), 51–51. [Google Scholar]
  3. Huang Li. Security research of information system in the era of big data. New economy, 2015 (11), 108. [Google Scholar]
  4. Peng Chao-Ran. Exposure factors and preventive measures for accounting informatization in the era of big data. Public Finance Research, 2014 (4), 73–76. [Google Scholar]
  5. Chen Liang. Research on security exposure assessment model of information system. Journal of Chinese Peoplen s Public Security University (Science and Technology). 2007, 50–53. [Google Scholar]
  6. Qian Gang. Information system security management. Nanjing: southeast university press, 2004. [Google Scholar]
  7. Zhang Tao. Key technology research on the bypass attack on the password-oriented chip: [doctoral thesis]. Chengdu: university of electronic science and technology 2008. [Google Scholar]
  8. Yao Jian-Bo, Zhang Tao. Quantitative evaluation model of side channel attack exposure. Computer engineering and application, 201248 (26), 84–87. [Google Scholar]
  9. Ji Dong Dynasty, Song Pen-Feng, Yu Tian-Xiang. Fuzzy analytic hierarchy process and its application in design optimization. System engineering and electronic technology, 2006,28 (11): 1692–1694. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.