The Application and Practice of Computer Network Security Technology in Electronic Information Engineering.

Zhen Wang
DOI: https://doi.org/10.1145/3617184.3618035
2023-01-01
Abstract:Along with the rapid development of science and technology, electronic information engineering has become ever more remarkable for its precise and convenient data processing and wide application fields. Its widespread application has not only change the way people obtain, store and manage information to a large extent, but also provide more new ways for people's convenient life. At the same time, with the broadening of data and information transmission channels, the security problems faced are becoming ever more prominent. The leakage of data and information in electronic information engineering, malicious tampering of the system, implantation of computer Trojan horse virus and other problems in the field of security occur frequently. And computer network security technology, as an important branch of computer network technology, takes an active part in protecting data and information security. Therefore, to ensure the security of electronic information engineering construction and application issues needs computer network security technology to achieve. In this paper, computer network security technology is used as a research tool, and two key technologies for network security, neural network of deep learning and convolutional operation, are applied. The convolutional neural network model trained and optimized by deep learning algorithm performs data information security assessment and analysis, identifies feature vectors and obtains feature element value results, and then realizes the process of analysis, prompting and early warning of information security in electronic information engineering. In addition, combined with the practical application of the model in electronic information engineering data transmission, it further reflects the importance of combining artificial intelligence-related technologies to improve the application scope of computer network security technology.
What problem does this paper attempt to address?