您当前的位置:
首页 >
文章列表页 >
Research and implementation of security configuration verification facility for big data
更新时间:2026-04-20
    • Research and implementation of security configuration verification facility for big data

    • Vol. 30, Issue 8, Pages: 32-36(2017)
    • DOI:10.13992/j.cnki.tetas.2017.08.007    

      CLC: TP309;TP311.13
    • Published:2017

    移动端阅览

  • 叶荣伟, 康乾, 黄一鸣. Research and implementation of security configuration verification facility for big data[J]. 2017, 30(8): 32-36. DOI: 10.13992/j.cnki.tetas.2017.08.007.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

56

下载量

4

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research of intelligent audit platform based on large data
User excavating method based on integrated scene labels
Research and practice of operation and maintenance safety control
Research on big data characteristics and data volume prediction method in 5G
A weak coverage analysis method and tool based on R language and big data

Related Author

王欢
许暖
沈波
何蕊馨
金科
黄斐一
梁飞
卜忠贵

Related Institution

中国移动通信集团安徽有限公司
中国移动通信集团设计院有限公司陕西分公司
咪咕文化科技有限公司
中国移动通信集团设计院有限公司
中国移动通信集团有限公司研究院
0