Open Access
Issue
SHS Web Conf.
Volume 170, 2023
2023 International Conference on Digital Economy and Management Science (CDEMS 2023)
Article Number 01007
Number of page(s) 5
Section Artificial Intelligence and Digital Economy
DOI https://doi.org/10.1051/shsconf/202317001007
Published online 14 June 2023
  1. Fang Z. L. In 2022, the market share of cloud computing of the three major operators increased rapidly [N]. People’s Post and Telecommunications, 2023-02-09 (007). DOI: 10.28659/N.cnki.nrmyd.2023.000365. [Google Scholar]
  2. Chen L., Yu S., Wang M. Design of high availability log analysis system based on distributed cluster [J]. Journal of China Academy of Electronic Science, 2020, 15 (05): 420–426. [Google Scholar]
  3. Zhou C. Research and development of key technologies of a log processing system for cloud services [D]. Xidian University, 2020. DOI: 10.27389/D.cnki.gxadu.2020.002933. [Google Scholar]
  4. Lin F. X., Liu J. Y., Zheng J., et al. Application of Rsyslog in IT log collection [J]. Cyberspace Security, 2019, 10 (04): 18–22. [Google Scholar]
  5. Liu Y., Zhou C. M., Zhang X. T. Design and implementation of multi-source security log based on big data [J]. Cyberspace Security, 2021, 12 (Z2): 28–33. [Google Scholar]
  6. Bo H., Huo D. N., Chen Y. S., Yang D. N., Xu W.W. Research on the constraint mechanism of big data technology application in enterprises [J]. Enterprise Technology and Development, 2020 (07): 3–5. [Google Scholar]
  7. Tao G., Song C. Y. Legal governance dilemma and normative application of enterprise data leakage [J]. China Information Security, 2021 (05): 34–36. [Google Scholar]
  8. Lu J., Yang C., Du R. R., et al. False data injection attack in power CPS [J]. Intelligent Computer and Application, 2022, 12 (06): 121–126. [Google Scholar]
  9. Guo S., Yang G. Q., Jiang Z. J. Distributed denial of service attack detection based on chaos theory in SDN network environment [J]. Journal of Lanzhou Jiaotong University, 2020, 39 (06): 45–50. [Google Scholar]
  10. Hu L. Preventive measures that enterprises should take to deal with cyber attacks [J]. Computer and Network, 2020, 46 (07): 52–53. [Google Scholar]
  11. Xin W., Gui C. X. Observation on the situation of network security vulnerabilities in the first half of 2022 [J]. China Information Security, 2022, No.154 (09): 85–87. [Google Scholar]
  12. Wan Xiaobo. Analysis of common data leakage causes and countermeasures in information systems [J]. Electronic Technology and Software Engineering, 2022, No.227 (09): 13–16. [Google Scholar]
  13. Wang P., Zhu W. M. Necessity and implementation method of electronic archives backup in different places [J]. Archives World, 2019 (09): 53–55. [Google Scholar]
  14. Xu G. Q. Current situation and countermeasures of heterogeneous backup of electronic archives in different places [J]. Archival Science Research, 2018, No.160 (01): 82–88. DOI: 10.16065/J.cnki.issn1002-1620.2018.01.014. [Google Scholar]
  15. Wang M. Application of data backup and disaster recovery in enterprise informatization construction [J]. China New Communications, 2019, 21 (06): 110. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.