Design and implementation of network integrated monitoring system driven by big data
曾彬,张文沛
A convolutional neural network Web abnormal flow detection method based on DAPA
高胜花,李世明,李秋月,於家伟,郑爱勤
Research on the guarantee ability of personal information security
倪惠康,何菲
A twothreshold point cloud feature extraction method with neighborhood adaptive
周建钊,颜雨吉,陈晨,杜文超
Design and implementation of a high-speed network flow recognition and processing system
路琪1,高翔2,许晓3,陈朝4
The method of implementing IAP and APP interrupt in MCU without interrupt vector relocate function
韩雨泓1,陈良勇2
Anti-fraud modeling and research of online loans based on time and space aggregation
俞旭峰1,王澎1,郭威2,张子柯1
Research on risk assessment model of community burglary
李逸佳
Research on electricity consumption classification and measurment method based on smart meter
梅凯1,蔡高琰2,骆德汉1,梁炳基2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。