{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T23:51:39Z","timestamp":1770162699889,"version":"3.49.0"},"reference-count":13,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T00:00:00Z","timestamp":1568592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,1,9]]},"abstract":"<jats:p>Communication network security is an important part of the digital signal processor. In particular, the process bus replaces the traditional hard wiring, which makes the network system extend from the second to the first time, greatly increasing the network scale and network traffic; the information transmitted on the process bus is absolutely large. Most requirements require strict real-time and high reliability. Therefore, information security is a major problem that threatens the security, stability, economy, and quality operation of network systems, and needs to be paid enough attention. This paper introduces the methods of information classification and information merging to improve the real-time information. It proposes to apply network security technologies such as information encryption technology, firewall technology, mobile agent, security management technology and virtual private network (VPN) technology to office network of the electric-power industry and analysed the specific application scenarios and effects.<\/jats:p>","DOI":"10.3233\/jifs-179384","type":"journal-article","created":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T07:25:55Z","timestamp":1568791555000},"page":"97-103","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on network security subsystem based on digital signal"],"prefix":"10.1177","volume":"38","author":[{"given":"Zhongru","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Qiang","family":"Ruan","sequence":"additional","affiliation":[{"name":"Beijing DigApis Technology Co., Ltd, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.06.020"},{"issue":"3","key":"e_1_3_1_3_2","first-page":"169","article-title":"Design and realization of network attack and defense simulation system terminal subsystem","volume":"30","author":"Yanguang L.","unstructured":"L.Yanguang, Design and realization of network attack and defense simulation system terminal subsystem, Computer & Modernization 30(3), 169\u2013172, 185.","journal-title":"Computer & Modernization"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.542"},{"issue":"8","key":"e_1_3_1_5_2","first-page":"998","article-title":"The application of network anomaly mining technology in campus network information security","volume":"756","author":"Bin W.","unstructured":"W.Bin, Z.C.Zhao and Y.C.Jiang, The application of network anomaly mining technology in campus network information security, Advanced Materials Research 756-759(8), 998\u20131002.","journal-title":"Advanced Materials Research"},{"issue":"10","key":"e_1_3_1_6_2","article-title":"Trust establishment in wireless sensor network and forwarding of packets using airport problem based game theory","volume":"5","author":"Angel J.","year":"2017","unstructured":"J.Angel and T.Ramesh, Trust establishment in wireless sensor network and forwarding of packets using airport problem based game theory, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) 5(10) (2017).","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721744"},{"issue":"9","key":"e_1_3_1_8_2","article-title":"Threshold based efficient data transmission in hybrid wireless networks","volume":"5","author":"Samundeeswari N.","year":"2017","unstructured":"N.Samundeeswari, Dr.S.Kumaravel and M.Namasivayam, Threshold based efficient data transmission in hybrid wireless networks, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) 5(9) (2017).","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3108"},{"issue":"8","key":"e_1_3_1_10_2","article-title":"A survey on big data","volume":"5","author":"Jain P.","year":"2017","unstructured":"P.Jain and K.Jha, A survey on big data, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE) 5(8) (2017).","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE)"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.006"},{"issue":"4","key":"e_1_3_1_12_2","first-page":"99","article-title":"Scheduling data intensive workloads through virtualization on mapreduce based clouds","volume":"3","author":"Rao B.T.","unstructured":"B.T.Rao and L.S.S.Reddy, Scheduling data intensive workloads through virtualization on mapreduce based clouds, International Journal of Distributed & Parallel Systems 3(4), 99\u2013110.","journal-title":"International Journal of Distributed & Parallel Systems"},{"issue":"5","key":"e_1_3_1_13_2","first-page":"5145","article-title":"Speed limits for quantum gates in multi-qubit systems","volume":"85","author":"Ashhab S.","unstructured":"S.Ashhab, P.C.D.Groot and F.Nori, Speed limits for quantum gates in multi-qubit systems, Physical Review A 85(5), 5145\u20135150.","journal-title":"Physical Review A"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1615-5"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179384","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179384","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T11:58:19Z","timestamp":1770119899000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,16]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,9]]}},"alternative-id":["10.3233\/JIFS-179384"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179384","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,16]]}}}