2021
DOI: 10.1155/2021/8792105
|View full text |Cite|
|
Sign up to set email alerts
|

Computer Multimedia Security Protection System Based on the Network Security Active Defense Model

Abstract: In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development. Through the existence of hidden dangers of computer multimedia security, a computer is constructed based on the network security active defense model. For a multimedia security protection system, select four modules in the system for design and description. Finally, the experimental results show that the system designed in this … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…This requires that the traditional information security protection measures be used as the basis to continuously increase the construction of information security. [6]…”
Section: Literature Surveymentioning
confidence: 99%
“…This requires that the traditional information security protection measures be used as the basis to continuously increase the construction of information security. [6]…”
Section: Literature Surveymentioning
confidence: 99%
“…e algorithm mainly uses the differential method to complete the evolution of the species population, improve the search speed, and enhance the convergence [10,11]. Figure 1 shows the power-sensitive early warning data conversion process of the multiobjective gap evolution algorithm [12].…”
Section: Multiobjective Gap Evolution Algorithmmentioning
confidence: 99%
“…While computer tech has brought great convenience to all walks of life, it also makes the dependence of related industries on computer networks continue to increase. In this context, the importance of computer cyber security protection for the protection of data and info security in all walks of life is also rising [9][10][11]. As a complex system engineering, computer cyber security design computer software, hardware and related login,…”
Section: Introductionmentioning
confidence: 99%