The construction of network security systems in rural financial institutions
左英男
The standard of blockchain applications model publication and deployment technologies research
白杰,李东云,吴先锋
Dozens of integer overflow vulnerabilities found in ERC20 smart contracts
陈力波,殷婷婷,倪远东,张超
Webshell detection method based on deep learning and semi-supervised learning
吴斌,赵力
Research on Servitization of Network Security Supervision Based on SECaaS
张智南1,柯贤良1,傅爱民2
Task scheduling based on chaotic disturbance particle swarm optimization algorithm in Cloud computing environment
许向阳,张芳磊
Comparisons on fusion algorithms of Landsat 8 OLI multi-spectral and panchromatic images
姜晓晨,邓正栋,武国瑛,王东豪
A fast time-space stereo matching method based on advanced driving assistance system
朱素杰,王萌
Research and implementation of the Kepu Cloud Webcast system based on Nginx
马艾田,耿立宏,王闰强,肖云,杜义华
Radar receiving front-end technology with frequency monitoring capability
张秋艳,王超,陈严君
The research on operating characteristics of diesel generating set with constant power pulse load
邢鑫,王金全,徐晔,严鋆,亢梦婕
Design and realization of a burst pulses generating system based on FPGA
冯传均,何泱,戴文峰
The design of FMMU module in EtherCAT slave controller based on FPGA
姚旺君,林浩,王永利,邢计元,张鹏
A study of stock price behavior based on feature selection and HMM
喻永生,谢天异丹,刘畅,郭靖雯,张卫东
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。