Research on computer security maintenance based on web server
As the core of web services, the security of web servers is crucial to the development of Internet communication. This paper designs a computer security monitoring system based on a web server, using a variety of computer security maintenance techniques such as SQL databases, public key cryptography...
Gespeichert in:
| Veröffentlicht in: | Applied mathematics and nonlinear sciences Jg. 10; H. 1 |
|---|---|
| 1. Verfasser: | |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Beirut
Sciendo
01.01.2025
De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| Schlagworte: | |
| ISSN: | 2444-8656, 2444-8656 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | As the core of web services, the security of web servers is crucial to the development of Internet communication. This paper designs a computer security monitoring system based on a web server, using a variety of computer security maintenance techniques such as SQL databases, public key cryptography systems, ISAPI filters, and so on. Through the system’s website anti-tampering module and server monitoring module, computer security is monitored and maintained in real-time. The fine-grained web page watermarking technology used by the system in this paper improves the reliability by 26.63% to 67.58% compared with the comparison method when the tampering amplitude is 0.7. And it has high accuracy in monitoring the tampering amplitude of sensitive information, with the relative error maintained below 10%. In addition, the system in this paper consumes less time in encrypting the data of the web server. When dealing with huge amount of data, the CPU utilization of the system in this paper is 2.73%~11.6%% higher than the database method, which can provide timely warning and maintain computer security. |
|---|---|
| AbstractList | As the core of web services, the security of web servers is crucial to the development of Internet communication. This paper designs a computer security monitoring system based on a web server, using a variety of computer security maintenance techniques such as SQL databases, public key cryptography systems, ISAPI filters, and so on. Through the system’s website anti-tampering module and server monitoring module, computer security is monitored and maintained in real-time. The fine-grained web page watermarking technology used by the system in this paper improves the reliability by 26.63% to 67.58% compared with the comparison method when the tampering amplitude is 0.7. And it has high accuracy in monitoring the tampering amplitude of sensitive information, with the relative error maintained below 10%. In addition, the system in this paper consumes less time in encrypting the data of the web server. When dealing with huge amount of data, the CPU utilization of the system in this paper is 2.73%~11.6%% higher than the database method, which can provide timely warning and maintain computer security. |
| Author | Ma, Jun |
| Author_xml | – sequence: 1 givenname: Jun surname: Ma fullname: Ma, Jun email: majun_0007@163.com organization: Experimental Teaching Center, Shandong University of Finance and Economics, Jinan, Shandong, 250002, China |
| BookMark | eNptkE1Lw0AQhhepYK29eg54Tp39yO7m4EGKX1AQRM_L7maqLc2m7iaW_HsTKujB08zhed9hnnMyCU1AQi4pLJhQ-trWIeUMWJEDL_UJmTIhRK5lISd_9jMyT2kLAIxTLiWbkpsXTGij_8iakPmm3nctxiyh7-Km7bPabkKLwQaPmbMJqxE7oBuI-IXxgpyu7S7h_GfOyNv93evyMV89Pzwtb1e5p4WiOaNeMlt4ZAq5QqikW2sukTttJXdeSFmqEpVj1lW8rAAQ0VlhC-0EsoLPyNWxdx-bzw5Ta7ZNF8Nw0nBaglbAKB2oxZHysUkp4trs46a2sTcUzGjJjJbMaMmMloZAeQwc7G54u8L32PXD8tv-f5AC5d9ivG_G |
| Cites_doi | 10.1109/CSF.2017.20 10.25236/IJFS.2021.030113 10.35314/shxy2045 10.1108/ICS-03-2018-0031 10.1109/ICOASE.2018.8548783 10.5334/dsj-2024-035 10.1109/ICCWS48432.2020.9292393 10.2991/aebmr.k.220404.032 10.1145/3038923 10.14722/ndss.2017.23456 10.3390/app132011525 10.37934/araset.29.3.198205 10.1007/978-3-030-33649-3 10.1016/j.compind.2020.103335 10.1088/1742-6596/1018/1/012012 10.1016/j.future.2016.10.005 10.1007/978-3-662-54970-4_25 10.1109/COMPSAC.2018.00144 10.1016/j.jisa.2023.103662 10.1109/I-SMAC.2018.8653728 10.2991/ijndc.k.190326.004 10.1109/ICRITO51393.2021.9596324 10.1109/MSEC.2019.2912700 10.1007/978-981-10-8848-3_42 10.1109/ICIMCIS53775.2021.9699285 10.1088/1742-6596/1744/3/032131 10.2991/iccia-19.2019.57 10.1007/s11042-024-19936-9 |
| ContentType | Journal Article |
| Copyright | 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2025. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS |
| DOI | 10.2478/amns-2025-0398 |
| DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One ProQuest Central Korea Proquest Central Premium ProQuest One Academic (New) ProQuest Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | CrossRef Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: PIMPY name: ProQuest Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Applied Sciences |
| EISSN | 2444-8656 |
| ExternalDocumentID | 10_2478_amns_2025_0398 10_2478_amns_2025_0398101 |
| GroupedDBID | 9WM AATOW ABFKT ADBLJ AFFHD AFKRA AHGSO ALMA_UNASSIGNED_HOLDINGS AMVHM ARCSS BENPR CCPQU EBS M~E OK1 PHGZM PHGZT PIMPY QD8 SLJYH AAYXX CITATION ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c1571-21c62a5ce27e37e0d6bf836e3b8a63bc466979e7b2abd39d00eeeba4a58b4e253 |
| IEDL.DBID | BENPR |
| ISSN | 2444-8656 |
| IngestDate | Sun Oct 19 01:32:38 EDT 2025 Sat Nov 29 08:05:48 EST 2025 Sat Nov 29 01:24:22 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. http://creativecommons.org/licenses/by-nc-nd/4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1571-21c62a5ce27e37e0d6bf836e3b8a63bc466979e7b2abd39d00eeeba4a58b4e253 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/3190870211?pq-origsite=%requestingapplication% |
| PQID | 3190870211 |
| PQPubID | 6761185 |
| PageCount | 17 |
| ParticipantIDs | proquest_journals_3190870211 crossref_primary_10_2478_amns_2025_0398 walterdegruyter_journals_10_2478_amns_2025_0398101 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-01-01 20250101 |
| PublicationDateYYYYMMDD | 2025-01-01 |
| PublicationDate_xml | – month: 01 year: 2025 text: 2025-01-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Beirut |
| PublicationPlace_xml | – name: Beirut |
| PublicationTitle | Applied mathematics and nonlinear sciences |
| PublicationYear | 2025 |
| Publisher | Sciendo De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| Publisher_xml | – name: Sciendo – name: De Gruyter Brill Sp. z o.o., Paradigm Publishing Services |
| References | (j_amns-2025-0398_ref_008) 2018; 1 (j_amns-2025-0398_ref_005) 2017; 6 (j_amns-2025-0398_ref_032) 2024 (j_amns-2025-0398_ref_027) 2023; 29 (j_amns-2025-0398_ref_018) 2020; 123 (j_amns-2025-0398_ref_004) 2017 (j_amns-2025-0398_ref_025) 2021; 3 (j_amns-2025-0398_ref_002) 2024; 9 (j_amns-2025-0398_ref_012) 2019; 27 (j_amns-2025-0398_ref_035) 2024 (j_amns-2025-0398_ref_034) 2024 (j_amns-2025-0398_ref_020) 2017; 50 (j_amns-2025-0398_ref_030) 2019; 17 (j_amns-2025-0398_ref_013) 2022; 1 (j_amns-2025-0398_ref_011) 2019; 7 (j_amns-2025-0398_ref_009) 2017; 74 (j_amns-2025-0398_ref_033) 2023 2025040106571816399_j_amns-2025-0398_ref_009 2025040106571816399_j_amns-2025-0398_ref_008 2025040106571816399_j_amns-2025-0398_ref_007 2025040106571816399_j_amns-2025-0398_ref_029 2025040106571816399_j_amns-2025-0398_ref_006 2025040106571816399_j_amns-2025-0398_ref_028 2025040106571816399_j_amns-2025-0398_ref_001 2025040106571816399_j_amns-2025-0398_ref_023 2025040106571816399_j_amns-2025-0398_ref_022 2025040106571816399_j_amns-2025-0398_ref_021 2025040106571816399_j_amns-2025-0398_ref_020 2025040106571816399_j_amns-2025-0398_ref_005 2025040106571816399_j_amns-2025-0398_ref_027 2025040106571816399_j_amns-2025-0398_ref_004 2025040106571816399_j_amns-2025-0398_ref_026 2025040106571816399_j_amns-2025-0398_ref_003 2025040106571816399_j_amns-2025-0398_ref_025 2025040106571816399_j_amns-2025-0398_ref_002 2025040106571816399_j_amns-2025-0398_ref_024 2025040106571816399_j_amns-2025-0398_ref_030 2025040106571816399_j_amns-2025-0398_ref_019 2025040106571816399_j_amns-2025-0398_ref_018 2025040106571816399_j_amns-2025-0398_ref_017 2025040106571816399_j_amns-2025-0398_ref_012 2025040106571816399_j_amns-2025-0398_ref_034 2025040106571816399_j_amns-2025-0398_ref_011 2025040106571816399_j_amns-2025-0398_ref_033 2025040106571816399_j_amns-2025-0398_ref_010 2025040106571816399_j_amns-2025-0398_ref_032 2025040106571816399_j_amns-2025-0398_ref_031 2025040106571816399_j_amns-2025-0398_ref_016 2025040106571816399_j_amns-2025-0398_ref_015 2025040106571816399_j_amns-2025-0398_ref_014 2025040106571816399_j_amns-2025-0398_ref_013 2025040106571816399_j_amns-2025-0398_ref_035 |
| References_xml | – volume: 7 start-page: 85 issue: 2 year: 2019 end-page: 92 ident: j_amns-2025-0398_ref_011 article-title: Design and implementation of an IoT-based smart home security system publication-title: International Journal of Networked and Distributed Computing – volume: 74 start-page: 385 year: 2017 end-page: 392 ident: j_amns-2025-0398_ref_009 article-title: Cloud security engineering: Early stages of SDLC publication-title: Future Generation Computer Systems – volume: 1 start-page: 21 issue: 1 year: 2022 end-page: 27 ident: j_amns-2025-0398_ref_013 article-title: Intelligent intrusion detection system for Apache web server empowered with machine learning approaches publication-title: International Journal of Computational and Innovative Sciences – volume: 3 issue: 1 year: 2021 ident: j_amns-2025-0398_ref_025 article-title: Computer Network Security Maintenance and Management in the Era of Big Data [J] publication-title: International Journal of Frontiers in Sociology – volume: 9 start-page: 765 issue: 2 year: 2024 end-page: 777 ident: j_amns-2025-0398_ref_002 article-title: The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers publication-title: INOVTEK Polbeng-Seri Informatika – volume: 50 start-page: 1 issue: 1 year: 2017 end-page: 34 ident: j_amns-2025-0398_ref_020 article-title: Surviving the web: A journey into web session security publication-title: ACM Computing Surveys (CSUR) – year: 2017 ident: j_amns-2025-0398_ref_004 article-title: The Security Impact of HTTPS Interception publication-title: In NDSS – volume: 29 start-page: 198 issue: 3 year: 2023 end-page: 205 ident: j_amns-2025-0398_ref_027 article-title: Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance publication-title: Journal of Advanced Research in Applied Sciences and Engineering Technology – volume: 1 start-page: 30 issue: 2 year: 2018 end-page: 48 ident: j_amns-2025-0398_ref_008 article-title: Security in Networks publication-title: International Journal of Business Management and Visuals – volume: 17 start-page: 78 issue: 4 year: 2019 end-page: 83 ident: j_amns-2025-0398_ref_030 article-title: Computer-security-oriented escape room publication-title: IEEE Security & Privacy – year: 2023 ident: j_amns-2025-0398_ref_033 article-title: Technique for Searching Data in a Cryptographically Protected SQL Database publication-title: Applied Sciences(20) – start-page: 35 year: 2024 end-page: 35 ident: j_amns-2025-0398_ref_032 article-title: Enhancement of a Transformation Algorithm to Migrate SQL Database into NoSQL Graph Database publication-title: Data Science Journal – start-page: 81901 year: 2024 end-page: 81901 ident: j_amns-2025-0398_ref_034 article-title: Retraction Note: Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm publication-title: Multimedia Tools and Applications(34) – start-page: 103662- year: 2024 ident: j_amns-2025-0398_ref_035 article-title: AdvEWM: Generating image adversarial examples by embedding digital watermarks publication-title: Journal of Information Security and Applications – volume: 6 start-page: 20694 issue: 3 year: 2017 end-page: 20698 ident: j_amns-2025-0398_ref_005 article-title: Intelligent smart home automation and security system using Arduino and Wi-fi publication-title: International Journal of Engineering And Computer Science (IJECS) – volume: 123 start-page: 103335 year: 2020 ident: j_amns-2025-0398_ref_018 article-title: Maintenance transformation through Industry 4.0 technologies: A systematic literature review publication-title: Computers in industry – volume: 27 start-page: 233 issue: 2 year: 2019 end-page: 272 ident: j_amns-2025-0398_ref_012 article-title: Socio-technical systems cybersecurity framework publication-title: Information & Computer Security – ident: 2025040106571816399_j_amns-2025-0398_ref_014 doi: 10.1109/CSF.2017.20 – ident: 2025040106571816399_j_amns-2025-0398_ref_025 doi: 10.25236/IJFS.2021.030113 – ident: 2025040106571816399_j_amns-2025-0398_ref_002 doi: 10.35314/shxy2045 – ident: 2025040106571816399_j_amns-2025-0398_ref_012 doi: 10.1108/ICS-03-2018-0031 – ident: 2025040106571816399_j_amns-2025-0398_ref_019 doi: 10.1109/ICOASE.2018.8548783 – ident: 2025040106571816399_j_amns-2025-0398_ref_032 doi: 10.5334/dsj-2024-035 – ident: 2025040106571816399_j_amns-2025-0398_ref_013 – ident: 2025040106571816399_j_amns-2025-0398_ref_021 doi: 10.1109/ICCWS48432.2020.9292393 – ident: 2025040106571816399_j_amns-2025-0398_ref_006 doi: 10.2991/aebmr.k.220404.032 – ident: 2025040106571816399_j_amns-2025-0398_ref_005 – ident: 2025040106571816399_j_amns-2025-0398_ref_020 doi: 10.1145/3038923 – ident: 2025040106571816399_j_amns-2025-0398_ref_004 doi: 10.14722/ndss.2017.23456 – ident: 2025040106571816399_j_amns-2025-0398_ref_028 – ident: 2025040106571816399_j_amns-2025-0398_ref_033 doi: 10.3390/app132011525 – ident: 2025040106571816399_j_amns-2025-0398_ref_027 doi: 10.37934/araset.29.3.198205 – ident: 2025040106571816399_j_amns-2025-0398_ref_029 doi: 10.1007/978-3-030-33649-3 – ident: 2025040106571816399_j_amns-2025-0398_ref_001 – ident: 2025040106571816399_j_amns-2025-0398_ref_018 doi: 10.1016/j.compind.2020.103335 – ident: 2025040106571816399_j_amns-2025-0398_ref_022 – ident: 2025040106571816399_j_amns-2025-0398_ref_003 doi: 10.1088/1742-6596/1018/1/012012 – ident: 2025040106571816399_j_amns-2025-0398_ref_009 doi: 10.1016/j.future.2016.10.005 – ident: 2025040106571816399_j_amns-2025-0398_ref_007 doi: 10.1007/978-3-662-54970-4_25 – ident: 2025040106571816399_j_amns-2025-0398_ref_010 doi: 10.1109/COMPSAC.2018.00144 – ident: 2025040106571816399_j_amns-2025-0398_ref_035 doi: 10.1016/j.jisa.2023.103662 – ident: 2025040106571816399_j_amns-2025-0398_ref_023 doi: 10.1109/I-SMAC.2018.8653728 – ident: 2025040106571816399_j_amns-2025-0398_ref_011 doi: 10.2991/ijndc.k.190326.004 – ident: 2025040106571816399_j_amns-2025-0398_ref_017 doi: 10.1109/ICRITO51393.2021.9596324 – ident: 2025040106571816399_j_amns-2025-0398_ref_030 doi: 10.1109/MSEC.2019.2912700 – ident: 2025040106571816399_j_amns-2025-0398_ref_024 doi: 10.1007/978-981-10-8848-3_42 – ident: 2025040106571816399_j_amns-2025-0398_ref_031 – ident: 2025040106571816399_j_amns-2025-0398_ref_008 – ident: 2025040106571816399_j_amns-2025-0398_ref_016 doi: 10.1109/ICIMCIS53775.2021.9699285 – ident: 2025040106571816399_j_amns-2025-0398_ref_015 doi: 10.1088/1742-6596/1744/3/032131 – ident: 2025040106571816399_j_amns-2025-0398_ref_026 doi: 10.2991/iccia-19.2019.57 – ident: 2025040106571816399_j_amns-2025-0398_ref_034 doi: 10.1007/s11042-024-19936-9 |
| SSID | ssj0002313662 |
| Score | 2.2785015 |
| Snippet | As the core of web services, the security of web servers is crucial to the development of Internet communication. This paper designs a computer security... |
| SourceID | proquest crossref walterdegruyter |
| SourceType | Aggregation Database Index Database Publisher |
| SubjectTerms | 68T01 Complete computer maintenance Cybersecurity ISAPI filter Public key cryptography SQL database Web server |
| Title | Research on computer security maintenance based on web server |
| URI | https://reference-global.com/article/10.2478/amns-2025-0398 https://www.proquest.com/docview/3190870211 |
| Volume | 10 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: M~E dateStart: 20160101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: BENPR dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Publicly Available Content Database customDbUrl: eissn: 2444-8656 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002313662 issn: 2444-8656 databaseCode: PIMPY dateStart: 20160101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFA-6efCy-YnTKTkInsLapE2ag4jKREFHEYV5Kkn7Kh7WzXZT_O9NttShiBdPvaQhvPfL-wy_h9BxKE26RsOUyFwzEmg_JyqXguggkAIsESXMSVxvxWAQDYcydgW3yj2rrG3i3FBn49TWyHsGKp7BlslXziavxE6Nst1VN0JjFTUtU5nBefOiP4jvv6osJnphnNMFWyMNRNRTo6Iy0KAh8ZiMvnujZYjZep83qzN4Lmcf07o5Ovc5V-3_nnYDtVy0ic8X8NhEK1BsobaLPLG719U2Oq0f4OFxgVM36AFXbrYdHinLKmGpOQBbt5fZZcb-YlvShXIHPV71Hy6viRusQFI_FD6hfsqpClOgApjRSMZ1HjEOTEeKM50GnEshQWiqdMZk5nkAoFWgwkgHQEO2ixrFuIA9hDOtlc51BiB4IMxfIuRgggZfMBCgeAed1AJOJgv-jMTkHVYViVVFYlWRWFV0ULcWZeLuUZUs5dhB9IdOlqt-39AYm_2_9zxA6wsk2IpKFzWm5QwO0Vr6Nn2pyiOHJfONb-7ip09UINdR |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3PT9swFH5C7SS4lI0NrRtjPgztZNHYjh0f0ITYEBWl6gEkOGV28oI4kLKmDPWf2t84vyZZxTRx47C7YyX5Pr2f9vcAPsU2pGsizrgtvOTKRwV3hTXcK2UNkhAlLkVcR2Y8Ti4v7WQNfrV3YehYZWsTl4Y6n2ZUI98PVBkEboV85cvdD05To6i72o7QqGlxiouHkLJVB8OvAd89IY6_nR-d8GaqAM-i2ERcRJkWLs5QGJThdXLti0RqlD5xWvpMaW2NReOF87m0-WCAiN4pFydeoaApEcHkdxWRvQPdyfBscvWnqhOiJam1qNUhhTLJvrstq0BFEfOBtMlj77cKaXsPy-Z4jtez-8W8bcYufdzx5v_2d15Cr4mm2WFN_1ewhuUWbDaRNWvsVvUaDtoDhmxasqwZZMGqZnYfu3WkmkHSI8jIree0LPgXRiVrnL2Bi2f5iG3olNMS3wLLvXe-8Dmi0cqEp0ysMQRFkZFo0Ok-fG4BTe9qfZA05FUEfUrQpwR9StD3YaeFLm3sRJWucOuD-IsDq1X_3jAY03dP7_kR1k_Oz0bpaDg-fQ8bNQuperQDnfnsHj_Ai-zn_Kaa7TY8ZvD9ucnxGwfaM_E |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+computer+security+maintenance+based+on+web+server&rft.jtitle=Applied+mathematics+and+nonlinear+sciences&rft.au=Ma%2C+Jun&rft.date=2025-01-01&rft.pub=De+Gruyter+Brill+Sp.+z+o.o.%2C+Paradigm+Publishing+Services&rft.eissn=2444-8656&rft.volume=10&rft.issue=1&rft_id=info:doi/10.2478%2Famns-2025-0398 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2444-8656&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2444-8656&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2444-8656&client=summon |