Citation: | PAN Yu. The Security Study of Coal Mine Information System Based on Computer Network[J]. Journal of Mine Automation, 2005, 31(4): 28-31. |
[1] | HE Yinjie, LI Chenxin, WEI Chunxian. Research on mine network security system based on boundary isolation and system protection[J]. Journal of Mine Automation, 2024, 50(3): 14-21. DOI: 10.13272/j.issn.1671-251x.2023100008 |
[2] | WU Haotia. Discussion on network security protection of coal enterprises[J]. Journal of Mine Automation, 2021, 47(S2): 165-167. |
[3] | MENG Qingyong, GU Chuang. Information security risk assessment of industrial Internet of coal mine[J]. Journal of Mine Automation, 2019, 45(8): 43-47. DOI: 10.13272/j.issn.1671-251x.17381 |
[4] | JIA Yibo, DU Xueke, WANG Jinfeng, FENG Lijie. Research of security resource allocation model of coal mine production logistics system based on maximum information entropy[J]. Journal of Mine Automation, 2016, 42(11): 33-37. DOI: 10.13272/j.issn.1671-251x.2016.11.008 |
[5] | ZHANG Qi, WANG Ji-sheng, PAN Tao, TIAN Xin-hui, SUN Yu-zhong. Study on multi-level security issues of digital mine[J]. Journal of Mine Automation, 2013, 39(11): 89-92. DOI: 10.7526/j.issn.1671-251X.2013.11.023 |
[6] | ZHOU Chao, YAO Xue-li. Analysis of Security Threat of Internal Network and Research of Its Preventio[J]. Journal of Mine Automation, 2009, 35(8): 112-115. |
[7] | LI Jin-ming~, LI Run~, QI Shang-long~. Research of Security Assessment System of Coal Mine Based on AHP-FCE[J]. Journal of Mine Automation, 2009, 35(4): 61-64. |
[8] | HU Yan-jun, MA Xiao-ping. Study on the Security of Information Issuing of Monitoring and Control System for Mine Safety and Productio[J]. Journal of Mine Automation, 2005, 31(4): 6-8. |
[9] | YIN Jian, ZHENG Yu-sha. Preliminary Study about the Memory Security and Its Applicatio[J]. Journal of Mine Automation, 2005, 31(1): 23-25. |
[10] | GU Jun , CHEN Zhi-guo , QIAN Jian-sheng , ZHANG Hong , ZHU Yi-cun . Application of Computer Network in Coal Sale Management Business[J]. Journal of Mine Automation, 2001, 27(5): 29-30. |