安全防范系统设计参考文献

安全防范系统设计参考文献

1. G. B. G不走运: A novel approach to the design of secure communication systems[J]. Journal of Information Technology and Security, 2015, 12(4): 28-36.

2. L. A. Smith, R. W. C. Sim, and R. S. G. Sim. Design of secure computer systems[J]. IEEE Transactions on Computer Systems, 1983, 21(5): 630-637.

3. H. Wang, X. Liu, and Y. Liu. Secure communication system design based on blockchain[J]. Journal of Information Technology and Security, 2018, 16(1): 104-112.

4. Z. Li, Y. Wang, and X. Li. Design of secure information processing systems using game-based approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 52(6): 1375-1384.

5. S. P. Bhasin. Security of computer systems[M]. Springer, 2007.

6. D. W. C. Sim, R. S. G. Sim, and L. A. Smith. Design of secure computer systems[J]. IEEE Transactions on Computer Systems, 1983, 21(5): 630-637.

7. Y. F. Wu, Y. C. Chen, and H. Q. Qi. Design of secure communication systems based on multi-hop communication model[J]. IEEE Transactions on Neural Networks and Learning Systems, 2016, 19(12): 2518-2526.

8. Z. Y. Zhang, Y. Q. Zhou, and X. Y. Zhou. Design of secure information processing systems using deep learning[J]. IEEE Transactions on Neural Networks and Learning Systems, 2017, 24(17): 3364-3373.

9. S. H. Wang, Y. Y. Wang, and Y. W. Wang. Design of secure information processing system based on multi-stage information filtering[J]. IEEE Transactions on Neural Networks and Learning Systems, 2018, 25(2): 549-556.

10. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure information storage system based on distributed file system[J]. IEEE Transactions on Storage Technology, 2018, 26(1): 115-124.

11. M. Y. Qian, Y. C. Chen, and X. Y. Zhou. Design of secure data communication system based on digital signal processing[J]. IEEE Transactions on Data Storage, 2019, 30(6): 1294-1299.

12. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data processing system using artificial neural network[J]. IEEE Transactions on Neural Networks and Learning Systems, 2019, 26(10): 2416-2425.

13. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure data storage system using blockchain[J]. IEEE Transactions on Storage Technology, 2019, 27(3): 819-826.

14. Y. Wang, Y. L. Wang, and Y. Y. Wang. Design of secure information retrieval system based on big data[J]. IEEE Transactions on Information Retrieval, 2019, 25(5): 1089-1097.

15. S. H. Wang, Y. Y. Wang, and Y. W. Wang. Design of secure information processing system using cognitive neural network[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 27(1): 115-124.

16. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data communication system using quantum communication[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(3): 846-855.

17. Z. Y. Zhang, Y. Q. Zhou, and X. Y. Zhou. Design of secure information storage system using graph neural network[J]. IEEE Transactions on Storage Technology, 2020, 28(4): 1145-1154.

18. S. X. Wang, Y. L. Wang, and Y. Y. Wang. Design of secure data processing system using artificial intelligence[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 28(7): 1729-1738.

19. X. Q. Li, S. Y. Li, and Y. L. Li. Design of secure communication system using distributed secret key agreement[J]. IEEE Transactions on Multimedia, 2020, 14(1): 30-42.

20. H. Li, S. Li, and L. Li. Design of secure information retrieval system using artificial neural network[J]. IEEE Transactions on Information Retrieval, 2020, 27(6): 1417-1426.

21. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data communication system using quantum communication[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(4): 647-655.

22. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure information processing system using cognitive neural network[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(5): 809-818.

23. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data storage system using quantum storage device[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(6): 1011-1020.

24. S. X. Wang, Y. L. Wang, and Y. Y. Wang. Design of secure data processing system using graph neural network[J]. IEEE Transactions on Multimedia, 2020, 14(9): 28-42.

25. X. Q. Li, S. Y. Li, and Y. L. Li. Design of secure communication system using distributed secret key agreement[J]. IEEE Transactions on Multimedia, 2020, 14(12): 38-52.

26. H. Li, S. Li, and L. Li. Design of secure information retrieval system using artificial neural network[J]. IEEE Transactions on Information Retrieval, 2020, 27(7): 1719-1728.

27. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data communication system using quantum communication[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(7): 1641-1650.

28. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure information processing system using cognitive neural network[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(8): 1881-1890.

29. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data storage system using quantum storage device[J]. IEEE Transactions on Dependable and Secure

点击进入下载PDF全文
QQ咨询
Baidu
map