Research on resilience assessment of industrial wireless internet based on attack intention
赵剑明1,2,3,4,曾鹏1,2,3,王天宇1,2,3
The intrusion detection method for IIoT based on GRU-Fed
谢承宗,王禹贺,王佰多,李世明
Research on construction of covert channels based on OSPF protocol Hello packet
赵自强1,李强2,郭涛1
Research on incentive mechanism for blockchainbased data exchange
孙雨虹1,张玉健1,赵越1,丁鲲2,3
Research on space target group matching technology based on time series vector similarity
张学文,于兴伟,侯鑫宇,姚云鹏,范光明
A cross domain data scheduling scheme based on blockchain for low orbit satellite Internet
单长胜,吕丽红,叶思雨
Deep attention based image caption model with fusion of global and semantic feature
及昕浩,彭玉青
Profile design and optimization of liquid rocket engine nozzle based on machine learning
李晨沛,周晨初,高玉闪,胡海峰
Collaborative filtering algorithm combining movie popularity and viewing time
钱泽俊,刘润然
Research on government data governance based on dissipative structure theory
付学敬,陈珍,章君玉
Research on university data service architecture and rapid application construction based on data platform
陆剑江
Exploring the rationale and practical application of the rules necessary for a contract without consent
伍旋航
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。