Discuss the Application of Big Data Technology in Computer Information Security
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).04Keywords:
Big data technology, Computer technology, Information securityAbstract
In the current period of continuous improvement of science and technology in China, many industries and fields have begun to apply big data technology to optimize work forms, improve work efficiency and reduce problems in practical operation. As computers are widely used in various industries, many enterprises have begun to promote computer information security to prevent confidential information from being leaked, affecting the sustainable development of enterprises. Accordingly, it is necessary to strengthen the effectiveness of computer security security management through the scientific application of big data technology to provide some lessons for technicians engaged in related work.
References
Tu, T. (2025). Log2Learn: Intelligent Log Analysis for Real-Time Network Optimization.
Wang, Hao. "Joint Training of Propensity Model and Prediction Model via Targeted Learning for Recommendation on Data Missing Not at Random." AAAI 2025 Workshop on Artificial Intelligence with Causal Techniques. 2025.
Ding, Cheng, and Chenwei Wu. "Self-Supervised Learning for Biomedical Signal Processing: A Systematic Review on ECG and PPG Signals." medRxiv (2024): 2024-09.
Restrepo, David, et al. "Multimodal Deep Learning for Low-Resource Settings: A Vector Embedding Alignment Approach for Healthcare Applications." medRxiv (2024): 2024-06.
Yang, Jing, et al. "A generative adversarial network-based extractive text summarization using transductive and reinforcement learning." IEEE Access (2025).
Xie, Minhui, and Shujian Chen. "CoreViz: Context-Aware Reasoning and Visualization Engine for Business Intelligence Dashboards." Authorea Preprints (2025).
Zhu, Bingxin. "TraceLM: Temporal Root-Cause Analysis with Contextual Embedding Language Models." (2025).
Zhang, Yuhan. "SafeServe: Scalable Tooling for Release Safety and Push Testing in Multi-App Monetization Platforms." (2025).
Hu, Xiao. "UnrealAdBlend: Immersive 3D Ad Content Creation via Game Engine Pipelines." (2025).
Wu, W., Bi, S., Zhan, Y., & Gu, X. (2025). Supply chain digitalization and energy efficiency (gas and oil): How do they contribute to achieving carbon neutrality targets?. Energy Economics, 142, 108140.
Peng, Qucheng, et al. "RAIN: regularization on input and network for black-box domain adaptation." arXiv preprint arXiv:2208.10531 (2022).
Zhang, Shengyuan, et al. "Research on machine learning-based anomaly detection techniques in biomechanical big data environments." Molecular & Cellular Biomechanics 22.3 (2025): 669-669.
Wang, Y. (2025, May). Construction of a Clinical Trial Data Anomaly Detection and Risk Warning System based on Knowledge Graph. In Forum on Research and Innovation Management (Vol. 3, No. 6).
Qi, R. (2025). Interpretable Slow-Moving Inventory Forecasting: A Hybrid Neural Network Approach with Interactive Visualization.
Fang, Z. (2025). Microservice-Driven Modular Low-Code Platform for Accelerating SME Digital Transformation.
Li, B. (2025). GIS-Integrated Semi-Supervised U-Net for Automated Spatiotemporal Detection and Visualization of Land Encroachment in Protected Areas Using Remote Sensing Imagery.
Lin, Tingting. "The Role of Generative AI in Proactive Incident Management: Transforming Infrastructure Operations."
Huang, Jingyi, and Yujuan Qiu. "LSTM‐Based Time Series Detection of Abnormal Electricity Usage in Smart Meters." (2025).
Chen, Rensi. "The application of data mining in data analysis." International Conference on Mathematics, Modeling, and Computer Science (MMCS2022). Vol. 12625. SPIE, 2023.
Li, Binghui. "AD-STGNN: Adaptive Diffusion Spatiotemporal GNN for Dynamic Urban Fire Vehicle Dispatch and Emergency." (2025).