-
81
Reverse teaching design of curriculum ideological and political in information security major—Take the wireless communication network security course of Xidian University as an example
Published 2021-06-01“…Curriculum ideological and political is a new topic in the teaching of information security major courses.The wireless communication network security course of Xidian University was taken as an example by the theory of reverse instructional design.By clarifying the concepts and principles of curriculum ideological and political construction, the curriculum ideological and political teaching design was carried out by the means of curriculum front-end design, teaching objective design, determine evaluation evidence, design learning activities, teaching Feedback.Through the demonstration of this case, the reference for how to carry out curriculum ideological and political teaching design in other courses were provided.…”
Get full text
Article -
82
Securing the Clicks : network security in the age of social media /
Published 2012Subjects: “…Computer networks Security measures. 8590…”
View in OPAC
Book -
83
Discrete propagation model of CDC-based benign worms
Published 2007-01-01Subjects: “…network security…”
Get full text
Article -
84
An Improved Network Risk Evaluation Metbod Based on Markov Game
Published 2014-07-01Subjects: “…network security…”
Get full text
Article -
85
-
86
Research on software-defined network and the security defense technology
Published 2017-11-01Subjects: Get full text
Article -
87
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01Subjects: Get full text
Article -
88
Causes and optimization of the false alarm rate of code review system
Published 2020-12-01Subjects: Get full text
Article -
89
User-habit based early warning of worm
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
90
Research on intrusion detection based on an improved GHSOM
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
91
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
92
-
93
Trustworthy identity system based on IPv6 source address validation
Published 2014-10-01Subjects: Get full text
Article -
94
Transductive quantitative calculation approach of network abnormality index
Published 2013-08-01Subjects: “…network security…”
Get full text
Article -
95
Research on security scenarios and security models for 6G networking
Published 2021-02-01Subjects: Get full text
Article -
96
Traffic measurement algorithm based on least recent used and Bloom filter
Published 2013-01-01Subjects: “…network security…”
Get full text
Article -
97
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
98
Constitute the passive infrastructure in network
Published 2003-01-01Subjects: “…network security…”
Get full text
Article -
99
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: “…network security…”
Get full text
Article -
100
User authentication scheme based on the ElGamal signature for mobile communication system
Published 2005-01-01Subjects: Get full text
Article