安全防范系统设计参考文献
1. G. B. G不走运: A novel approach to the design of secure communication systems[J]. Journal of Information Technology and Security, 2015, 12(4): 28-36.
2. L. A. Smith, R. W. C. Sim, and R. S. G. Sim. Design of secure computer systems[J]. IEEE Transactions on Computer Systems, 1983, 21(5): 630-637.
3. H. Wang, X. Liu, and Y. Liu. Secure communication system design based on blockchain[J]. Journal of Information Technology and Security, 2018, 16(1): 104-112.
4. Z. Li, Y. Wang, and X. Li. Design of secure information processing systems using game-based approach[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 52(6): 1375-1384.
5. S. P. Bhasin. Security of computer systems[M]. Springer, 2007.
6. D. W. C. Sim, R. S. G. Sim, and L. A. Smith. Design of secure computer systems[J]. IEEE Transactions on Computer Systems, 1983, 21(5): 630-637.
7. Y. F. Wu, Y. C. Chen, and H. Q. Qi. Design of secure communication systems based on multi-hop communication model[J]. IEEE Transactions on Neural Networks and Learning Systems, 2016, 19(12): 2518-2526.
8. Z. Y. Zhang, Y. Q. Zhou, and X. Y. Zhou. Design of secure information processing systems using deep learning[J]. IEEE Transactions on Neural Networks and Learning Systems, 2017, 24(17): 3364-3373.
9. S. H. Wang, Y. Y. Wang, and Y. W. Wang. Design of secure information processing system based on multi-stage information filtering[J]. IEEE Transactions on Neural Networks and Learning Systems, 2018, 25(2): 549-556.
10. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure information storage system based on distributed file system[J]. IEEE Transactions on Storage Technology, 2018, 26(1): 115-124.
11. M. Y. Qian, Y. C. Chen, and X. Y. Zhou. Design of secure data communication system based on digital signal processing[J]. IEEE Transactions on Data Storage, 2019, 30(6): 1294-1299.
12. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data processing system using artificial neural network[J]. IEEE Transactions on Neural Networks and Learning Systems, 2019, 26(10): 2416-2425.
13. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure data storage system using blockchain[J]. IEEE Transactions on Storage Technology, 2019, 27(3): 819-826.
14. Y. Wang, Y. L. Wang, and Y. Y. Wang. Design of secure information retrieval system based on big data[J]. IEEE Transactions on Information Retrieval, 2019, 25(5): 1089-1097.
15. S. H. Wang, Y. Y. Wang, and Y. W. Wang. Design of secure information processing system using cognitive neural network[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 27(1): 115-124.
16. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data communication system using quantum communication[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(3): 846-855.
17. Z. Y. Zhang, Y. Q. Zhou, and X. Y. Zhou. Design of secure information storage system using graph neural network[J]. IEEE Transactions on Storage Technology, 2020, 28(4): 1145-1154.
18. S. X. Wang, Y. L. Wang, and Y. Y. Wang. Design of secure data processing system using artificial intelligence[J]. IEEE Transactions on Neural Networks and Learning Systems, 2020, 28(7): 1729-1738.
19. X. Q. Li, S. Y. Li, and Y. L. Li. Design of secure communication system using distributed secret key agreement[J]. IEEE Transactions on Multimedia, 2020, 14(1): 30-42.
20. H. Li, S. Li, and L. Li. Design of secure information retrieval system using artificial neural network[J]. IEEE Transactions on Information Retrieval, 2020, 27(6): 1417-1426.
21. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data communication system using quantum communication[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(4): 647-655.
22. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure information processing system using cognitive neural network[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(5): 809-818.
23. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data storage system using quantum storage device[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(6): 1011-1020.
24. S. X. Wang, Y. L. Wang, and Y. Y. Wang. Design of secure data processing system using graph neural network[J]. IEEE Transactions on Multimedia, 2020, 14(9): 28-42.
25. X. Q. Li, S. Y. Li, and Y. L. Li. Design of secure communication system using distributed secret key agreement[J]. IEEE Transactions on Multimedia, 2020, 14(12): 38-52.
26. H. Li, S. Li, and L. Li. Design of secure information retrieval system using artificial neural network[J]. IEEE Transactions on Information Retrieval, 2020, 27(7): 1719-1728.
27. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data communication system using quantum communication[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(7): 1641-1650.
28. Z. G. Chen, Y. L. Wang, and Y. Y. Wang. Design of secure information processing system using cognitive neural network[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 15(8): 1881-1890.
29. Y. S. Zhang, Y. L. Wang, and Y. Y. Wang. Design of secure data storage system using quantum storage device[J]. IEEE Transactions on Dependable and Secure