{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:15Z","timestamp":1750220475524,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3482632.3487444","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T17:26:23Z","timestamp":1637601983000},"page":"2426-2429","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm Based on Data mining"],"prefix":"10.1145","author":[{"given":"Mingdong","family":"He","sequence":"first","affiliation":[{"name":"Guangdong Power Grid Company, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"issue":"8","key":"e_1_3_2_1_1_1","first-page":"148","article-title":"Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm","volume":"4","author":"Yang Pinfang","year":"2020","unstructured":"Yang Pinfang . Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm . Modern Information Technology , vol. 4 , no. 8 , pp. 148 - 149 +152, 2020 . Yang Pinfang. Research on Computer Network Information Security Protection Strategy and Evaluation Algorithm. Modern Information Technology, vol. 4, no. 8, pp. 148-149+152, 2020.","journal-title":"Modern Information Technology"},{"issue":"2","key":"e_1_3_2_1_2_1","first-page":"210","article-title":"Discussion on Computer Network Information Security Protection Strategy and Evaluation Algorithm","volume":"37","author":"Kong Chuiyu","year":"2019","unstructured":"Kong Chuiyu . Discussion on Computer Network Information Security Protection Strategy and Evaluation Algorithm . Digital Technology and Application , vol. 37 , no. 2 , pp. 210 - 211 , 2019 . Kong Chuiyu. Discussion on Computer Network Information Security Protection Strategy and Evaluation Algorithm. Digital Technology and Application, vol. 37, no. 2, pp. 210-211, 2019.","journal-title":"Digital Technology and Application"},{"issue":"3","key":"e_1_3_2_1_3_1","first-page":"58","article-title":"Discussion on the Application of data mining Technology","volume":"240","author":"Song Junsu","year":"2020","unstructured":"Song Junsu . Discussion on the Application of data mining Technology in Computer Network Virus Prevention. Information Technology and Informatization , vol. 240 , no. 3 , pp. 58 - 60 , 2020 . Song Junsu. Discussion on the Application of data mining Technology in Computer Network Virus Prevention. Information Technology and Informatization, vol. 240, no. 3, pp. 58-60, 2020.","journal-title":"Computer Network Virus Prevention. Information Technology and Informatization"},{"issue":"4","key":"e_1_3_2_1_4_1","first-page":"202","article-title":"Computer network information security optimization encryption algorithm design","volume":"160","author":"Zhang Dapeng","year":"2018","unstructured":"Zhang Dapeng . Computer network information security optimization encryption algorithm design . Digital Communication World , vol. 160 , no. 4 , pp. 128+ 202 , 2018 . Zhang Dapeng. Computer network information security optimization encryption algorithm design. Digital Communication World, vol. 160, no. 4, pp. 128+202, 2018.","journal-title":"Digital Communication World"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"23","article-title":"Influencing factors and preventive measures of computer network security technology","volume":"4","author":"Wu Ruohua","year":"2021","unstructured":"Wu Ruohua . Influencing factors and preventive measures of computer network security technology . Modern Education Forum , vol. 4 , no. 4 , pp. 23 - 24 , 2021 . Wu Ruohua. Influencing factors and preventive measures of computer network security technology. Modern Education Forum, vol. 4, no. 4, pp. 23-24, 2021.","journal-title":"Modern Education Forum"},{"volume-title":"Solving Problems in a Physical Laboratory for Computer Networks and Data Security: A Conceptual Framework with Students Experiences. The international journal of engineering education","author":"Stojanov","key":"e_1_3_2_1_6_1","unstructured":"Stojanov , Zeljko, Dobrilovic , Solving Problems in a Physical Laboratory for Computer Networks and Data Security: A Conceptual Framework with Students Experiences. The international journal of engineering education , vol. 32 , no. 6, pp. 2517 -2530, 2016. Stojanov, Zeljko, Dobrilovic, Solving Problems in a Physical Laboratory for Computer Networks and Data Security: A Conceptual Framework with Students Experiences. The international journal of engineering education, vol. 32, no. 6, pp. 2517 -2530, 2016."},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"229","volume":"7485","author":"Garay J A","year":"2016","unstructured":"Garay J A , Prisco R D . Security and Cryptography for Networks . Lecture Notes in Computer Science , vol. 7485 , no. 1 , pp. 229 \u2013 241 , 2016 . Garay J A, Prisco R D. Security and Cryptography for Networks. Lecture Notes in Computer Science, vol. 7485, no. 1, pp. 229\u2013241, 2016.","journal-title":"Lecture Notes in Computer Science"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-16863"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-160546"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21938"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu066"},{"issue":"11","key":"e_1_3_2_1_12_1","first-page":"43","article-title":"Computer Network Information Security Threats and Data Encryption Technology Research","volume":"239","author":"Zhao Renfei","year":"2020","unstructured":"Zhao Renfei . Computer Network Information Security Threats and Data Encryption Technology Research . Network Security Technology and Application , vol. 239 , no. 11 , pp. 43 - 44 , 2020 . Zhao Renfei. Computer Network Information Security Threats and Data Encryption Technology Research. Network Security Technology and Application, vol. 239, no. 11, pp. 43-44, 2020.","journal-title":"Network Security Technology and Application"},{"issue":"17","key":"e_1_3_2_1_13_1","first-page":"92","article-title":"Analysis of Computer Network Information Security and Protection Technology in the New Era","volume":"113","author":"Xu Hui","year":"2018","unstructured":"Xu Hui . Analysis of Computer Network Information Security and Protection Technology in the New Era . Technology and Innovation , vol. 113 , no. 17 , pp. 92 - 93 , 2018 . Xu Hui. Analysis of Computer Network Information Security and Protection Technology in the New Era. Technology and Innovation, vol. 113, no. 17, pp. 92-93, 2018.","journal-title":"Technology and Innovation"},{"issue":"12","key":"e_1_3_2_1_14_1","first-page":"138","article-title":"Research on Threats and Protection Strategies of Network Information Security under Big Data","volume":"180","author":"Cui Hai","year":"2017","unstructured":"Cui Hai . Research on Threats and Protection Strategies of Network Information Security under Big Data . Information and Communication , vol. 180 , no. 12 , pp. 138 - 139 , 2017 . Cui Hai. Research on Threats and Protection Strategies of Network Information Security under Big Data. Information and Communication, vol. 180, no. 12, pp. 138-139, 2017.","journal-title":"Information and Communication"}],"event":{"name":"ICISCAE 2021: 2021 IEEE 4th International Conference on Information Systems and Computer Aided Education","acronym":"ICISCAE 2021","location":"Dalian China"},"container-title":["2021 4th International Conference on Information Systems and Computer Aided Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3482632.3487444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:43Z","timestamp":1750193323000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3482632.3487444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":14,"alternative-id":["10.1145\/3482632.3487444","10.1145\/3482632"],"URL":"https:\/\/doi.org\/10.1145\/3482632.3487444","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}