With the progress of the times, big data will follow the development of the Internet and show a broader development space. But the characteristics of big data itself also make it more difficult to solve the problems of network attacks and theft of sensitive information. Therefore, it is more important to conduct in-depth research on network information security in many fields in the context of big data. In this paper, we build a DFN-Big Data network model based on deep feed-forward network as the algorithm, and conduct an in-depth study on network information security. The calculation results show that, among several leakage methods of personal information, the leakage caused by hacking is the most dangerous and unpredictable. The percentag...
Network flow data provide valuable information to understand the network state and to be aware of t...
Based on the design idea of future network, this paper analyzes the network security data sampling a...
NSAWS is an intelligent and real-time large database management system. By analyzing the user identi...
With the progress of the times, big data will follow the development of the Internet and show a broa...
In the context of the information age, computer network technology continues to innovate and plays a...
With the increasing degree of information technology in China, the Internet information technology i...
with the continuous progress and development of information technology, the modern society has usher...
The core of an Internet enterprise is the data of the network platform, which usually includes a lar...
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have m...
The analysis and application of big data has become the frontier science at this era. People make un...
Abstract — In this paper main big-data security issues are discussed. The challenges of security in ...
Big Data optimizes the process of information processing, expands the scale of information processin...
Statistical data on information security that concerns Big Data and is the most important for enterp...
Big Data has emerged as an advanced discovery for large scale data collection. Data generated by lar...
Data is currently one of the most important assets for companies in every field. The continuous grow...
Network flow data provide valuable information to understand the network state and to be aware of t...
Based on the design idea of future network, this paper analyzes the network security data sampling a...
NSAWS is an intelligent and real-time large database management system. By analyzing the user identi...
With the progress of the times, big data will follow the development of the Internet and show a broa...
In the context of the information age, computer network technology continues to innovate and plays a...
With the increasing degree of information technology in China, the Internet information technology i...
with the continuous progress and development of information technology, the modern society has usher...
The core of an Internet enterprise is the data of the network platform, which usually includes a lar...
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have m...
The analysis and application of big data has become the frontier science at this era. People make un...
Abstract — In this paper main big-data security issues are discussed. The challenges of security in ...
Big Data optimizes the process of information processing, expands the scale of information processin...
Statistical data on information security that concerns Big Data and is the most important for enterp...
Big Data has emerged as an advanced discovery for large scale data collection. Data generated by lar...
Data is currently one of the most important assets for companies in every field. The continuous grow...
Network flow data provide valuable information to understand the network state and to be aware of t...
Based on the design idea of future network, this paper analyzes the network security data sampling a...
NSAWS is an intelligent and real-time large database management system. By analyzing the user identi...