Welcome to Francis Academic Press

International Journal of New Developments in Education, 2023, 5(19); doi: 10.25236/IJNDE.2023.051903.

Exploration of Network Security Professional Classroom in Higher Vocational Colleges in the Era of Big Data

Author(s)

Jicheng Chen, Hongyou Ge, Long Zhao, Juan Sun

Corresponding Author:
Jicheng Chen
Affiliation(s)

School of Computer and Communication, Jiangsu Vocational College of Electronics and Information, Huaian, China

Abstract

With the rapid development of information technology, big data has gradually penetrated into all walks of life, and has had a profound impact on various fields. As higher vocational colleges, the classroom education of network security majors should also keep pace with the times and explore how to better cultivate network security talents in the era of big data. This paper mainly applies the factor analysis method to obtain the important index of network security classroom evaluation, and uses the questionnaire survey method to collect the student satisfaction data. According to the experimental and survey data, 88% of the students are satisfied with the environment of the training room. As to whether the course is combined with the reality, 68% of the students expressed satisfaction and high degree of union, and 30% thought it was general. Therefore, it is necessary to further explore this major.

Keywords

big data, higher vocational colleges, network security, professional classroom

Cite This Paper

Jicheng Chen, Hongyou Ge, Long Zhao, Juan Sun. Exploration of Network Security Professional Classroom in Higher Vocational Colleges in the Era of Big Data. International Journal of New Developments in Education (2023) Vol. 5, Issue 19: 21-27. https://doi.org/10.25236/IJNDE.2023.051903.

References

[1] SeukGue Hong, HyungBin Seo, MyungKeun Yoon: Data Auditing for Intelligent Network Security Monitoring. IEEE Commun. Mag. 2023, 61(3): 74-79. 

[2] Ranganathan Mavureddi Dhanasekaran, Jing Ping, German Peinado Gomez: End-to-End Network Slicing Security Across Standards Organizations. IEEE Commun. Stand. Mag. 2023, 7(1): 40-47. 

[3] Aanjanadevi, S. Aanjankumar, K. R. Ramela, V. Palanisamy: Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. Comput. Syst. Sci. Eng. 2023, 45(3): 2351-2362. 

[4] Junfeng Sun, Chenghai Li, Yafei Song, Peng Ni, Jian Wang: Network Security Situation Prediction Based on TCAN-BiGRU Optimized by SSA and IQPSO. Comput. Syst. Sci. Eng. 2023, 47(1): 993-1021. 

[5] Nandita Pattnaik, Shujun Li, Jason R. C. Nurse: A Survey of User Perspectives on Security and Privacy in a Home Networking Environment. ACM Comput. Surv. 2023, 55(9): 1-180. 

[6] Benyamin MazhariSefat, Soodeh Hosseini: Social network security using genetic algorithm. Evol. Syst. 2023, 14(2): 175-190. 

[7] Minh-Nam Pham, Duy-Hung Ha, Tran Trung Duy, Le-Tien Thuong: Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location. ICT Express2023, 9(1): 63-68. 

[8] Pavol Sokol, Richard Stana, Andrej Gajdos, Patrik Pekarcík: Network security situation awareness forecasting based on statistical approach and neural networks. Log. J. IGPL 2023, 31(2): 352-374. 

[9] Durga, Periyasamy Sudhakar: Implementing RSA algorithm for network security using dual prime secure protocol in crypt analysis. Int. J. Adv. Intell. Paradigms 2023, 24(3/4): 355-368. 

[10] Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch: i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security. Int. J. Inf. Secur. Priv. 2023, 17(1): 1-17. 

[11] Umesh K. Raut, L. K. Vishwamitra: Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks. Int. J. Pervasive Comput. Commun. 2023, 19(1): 97-123. 

[12] Elmehdi Illi, Marwa K. Qaraqe, Faissal El Bouanani, Saif M. Al-Kuwari: On the Physical-Layer Security of a Dual-Hop UAV-Based Network in the Presence of Per-Hop Eavesdropping and Imperfect CSI. IEEE Internet Things J. 2023, 10(9): 7850-7867. 

[13] Shalli Rani, Himanshi Babbar, Gautam Srivastava, Thippa Reddy Gadekallu, Gaurav Dhiman: Security Framework for Internet-of-Things-Based Software-Defined Networks Using Blockchain. IEEE Internet Things J. 2023, 10(7): 6074-6081. 

[14] Abdelwahab Boualouache, Bouziane Brik, Sidi-Mohammed Senouci, Thomas Engel: On-Demand Security Framework for 5GB Vehicular Networks. IEEE Internet Things Mag. 2023, 6(2): 26-31. 

[15] Somia Sahraoui, Nabil Henni: SAMP-RPL: secure and adaptive multipath RPL for enhanced security and reliability in heterogeneous IoT-connected low power and lossy networks. J. Ambient Intell. Humaniz. Comput. 2023, 14(1): 409-429.