Zhihu Wang. (27-29 May 2011)."Design and realization of computer network security
perception control system," Communication Software and Networks (ICCSN), 2011 IEEE
3rd International Conference on, vol., no., pp.163,166. Retrieved July 9, 2013,
from IEEE Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6014242&isnumber=6013532
Jinhua Wang; Xiaodong Liu. (27-29 May 2011)."Computer network security of university
and preventive strategy," Communication Software and Networks (ICCSN), 2011 IEEE
3rd International Conference on, pp.143,145. Retrieved July 9, 2013, from IEEE
Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6014237&isnumber=6013532
Jun Fei; Huan Xu. (27-29 Mar 2010)."Assessing computer network security with fuzzy
analytic hierarchy process," Advanced Computer Control (ICACC), 2010 2nd International
Conference on, vol.5, pp.204,208. Retrieved July 9, 2013, from IEEE Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5487259&isnumber=5486785
Lin Wang; Mander, T.; Cheung, H.; Nabhani, F.; Cheung, R. (24-28 June 2007)."Security
Operation Modes for Enhancement of Utility Computer Network Cyber-Security," Power
Engineering Society General Meeting, 2007. IEEE, pp.1,8. Retrieved July 9, 2013,
from IEEE Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4275951&isnumber=4275199
El-Barr, M.A.; Zakir, A.; Sait, S.M.; Almulhem, A. (28-30 Aug 2008). "Reliability
and fault tolerance based topological optimization of computer networks - part I:
enumerative techniques," Communications, Computers and signal Processing, 2003.
PACRIM. 2003 IEEE Pacific Rim Conference on, vol.2, pp.732,735. Retrieved July
9, 2013, from IEEE Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1235885&isnumber=27701
Junshun Hu; Xiaoyan Liang; Yang Bo; Chunhe Xia. (Oct 30, 2012-Nov 2, 2012)."The
consistency verification of Computer Network Defense Policy and measures, " Information
and Communication Technologies (WICT), 2012 World Congress on, pp.1052,1055. Retrieved
July 9, 2013, from IEEE Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6409230&isnumber=6409038
Zhang Jie; Zhang Jianwei; Dou Yaxing. (23-25 Mar 2012)."Research and Realization
of Computer Network Complex Practical Teaching Platform of Virtual Reality," Computer
Science and Electronics Engineering (ICCSEE), 2012 International Conference on,
vol.1, pp.383. Retrieved July 9, 2013, from IEEE Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6188073&isnumber=6187799
Hamlyn, A.; Cheung, H.; Mander, T.; Lin Wang; Cungang Yang; Cheung, R. (20-24 July
2008). "Computer network security management and authentication of smart grids operations,
" Power and Energy Society General Meeting - Conversion and Delivery of Electrical
Energy in the 21st Century, 2008 IEEE, pp.1,7. Retrieved July 9, 2013, from IEEE
Xplore.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4596900&isnumber=4595968