![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Research on Telecommuting Security Solution Based on Zero Trust Architecture
With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments....
-
Chapter and Conference Paper
Research and Implementation of Cooperative Utilization of Network Security Devices for Typical Security Events
Aiming to improve the efficiency of network security protection, the collaborative utilization of network security devices is studied. Firstly, the utilization status quo of network security devices was analyz...
-
Article
Effect of carbon do** on corrosion resistance and conductivity of CrMoN-coated 316L stainless steel bipolar plates
CrMoCN coatings with different carbon contents are prepared on 316L stainless steel substrates by closed-field unbalanced magnetron sputtering. The microstructure, phase composition, bonding state, corrosion p...
-
Chapter and Conference Paper
Steganalysis of Content-Adaptive JPEG Steganography Based on Ensemble of Convolutional Neural Networks with Image Preprocessing Using Gabor Filters
As we know, compared with the feature-based steganalysis method, deep convolutional neural networks (DCNNs) have firmly established themselves as the superior steganography detectors. In this paper, considerin...
-
Chapter and Conference Paper
Research on Technical System for Cyberspace Surveying and Map**
With the rapid development of the network, various businesses continue to appear, and the number of cyberspace protection targets is increasing exponentially. How to find out the family background, recognize t...