A mixed mutual authentication scheme supporting faultdetection in industrial Internet of Things
沈宫新,宋楚平
Optimization of branch covering symbol execution based on constraints
於家伟,李世明,毕雪洁,李秋月,高胜花
A research method of industrial Internet security vulnerabilities based on knowledge graph
陶耀东,贾新桐,吴云坤
Application of software definition boundary security model in power grid enterprise system
文星
Study on the influence of smoke diffusion on personnel evacuation based on turbulent large eddy algorithm
张志,邓忠凯,杨水亲,骆秋良,吴炜佳,李超伟
Research on expression recognition based on hybrid attention mechanism
高健,林志贤,郭太良
Implementation and application of convolution gating network model combined with position information
时昭丽,范红,陈佳伟,董亚博,张子薇,许武军
Action recognition algorithm based on DenseNet and depth motion map
张健,张永辉,何京璇
Research on local deployment and scheduling problem of user behavior simulation
纪一方,张国敏,邢长友
Research on energy consumption analysis method of tram based on control chart
樊辉,李进明
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。