Research on Computer Network Information Security and Protection Strategies

Research on Computer Network Information Security and Protection Strategies

Authors

  • Zhiyi Hu Longdong University Qingyang, Gansu 745000, China

DOI:

https://doi.org/10.53469/wjimt.2025.08(05).05

Keywords:

Computer Network Information, Security, Protection Strategies

Abstract

With the rapid and ongoing development of computer technology in the current stage, computers have found wide application in peoples lives. In the practical use of computer networks, both administrators and users pay particular attention to this issue. It is essential to recognize the shortcomings in this area and implement appropriate measures to address these issues. Only through such actions can we enhance the security of computer network information, provide necessary support for computer network applications, and fully leverage the advantages of computer networks. This article primarily focuses on the analysis and discussion of computer network information security and proposes relevant protective measures, with the hope that it can serve as a reference for all.

References

Wang, Y., Yang, T., Liang, H., & Deng, M. (2022). Cell atlas of the immune microenvironment in gastrointestinal cancers: Dendritic cells and beyond. Frontiers in Immunology, 13, 1007823.

Wang, J. (2025). Predictive Modeling for Sortation and Delivery Optimization in E-Commerce Logistics.

Li, T. (2025). Enhancing Adverse Event Monitoring and Management in Phase IV Chronic Disease Drug Trials: Applications of Machine Learning.

Yuan, J. (2024, December). Efficient techniques for processing medical texts in legal documents using transformer architecture. In 2024 4th International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC) (pp. 990-993). IEEE.

Song, X. (2024). Leveraging aigc and human-computer interaction design to enhance efficiency and quality in e-commerce content generation.

Chen, J. (2025). Data Quality Quantized Framework: Ensuring Large-Scale Data Integration in Gig Economy Platforms.

Chen, J. (2025). Geospatial Neural Networks: Enhancing Smart City through Location Intelligence.

Wang, H. (2024). The Restriction and Balance of Prior Rights on the Right of Enterprise Name.

Gong, C., Lin, Y., Cao, J., & Wang, J. (2024, October). Research on Enterprise Risk Decision Support System Optimization based on Ensemble Machine Learning. In Proceeding of the 2024 5th International Conference on Computer Science and Management Technology (pp. 1003-1007).

Bohang, L., Li, N., Yang, J. et al. Image steganalysis using active learning and hyperparameter optimization. Sci Rep 15, 7340 (2025). https://doi.org/10.1038/s41598-025-92082-w

Zhao, H., Chen, Y., Dang, B., & Jian, X. (2024). Research on Steel Production Scheduling Optimization Based on Deep Learning.

Yao, T., Jian, X., He, J., & Meng, Q. (2025). Drone-3D Printing Linkage for Rapid Construction of Sustainable Post-Disaster Temporary Shelters.

Yang, W., Zhang, B., & Wang, J. (2025). Research on AI Economic Cycle Prediction Method Based on Big Data.

Ji, F., Zheng, X., Xue, H., & Wang, J. (2025). A Study on the Application of Artificial Intelligence in Personalized Go-to-Market Strategy in Retail Industry.

Yang, J., Tang, Y., Li, Y., Zhang, L., & Zhang, H. (2025). Cross-Asset Risk Management: Integrating LLMs for Real-Time Monitoring of Equity, Fixed Income, and Currency Markets. arXiv preprint arXiv:2504.04292.

Peng, Y., Zhang, G., & Pang, H. (2025). Exploring the effects of IoT-enhanced exercise and cognitive training on executive function in middle-aged adults. Alexandria Engineering Journal, 120, 106-115.

Yang, Jie, et al. "Dynamic Hedging Strategies in Derivatives Markets with LLM-Driven Sentiment and News Analytics." arXiv preprint arXiv:2504.04295 (2025).

Downloads

Published

2025-05-12

Issue

Section

Articles
Loading...