Thoughts and suggestions on the development of industrial Internet in military industry
王晓磊1,张宏斌2,廖义林3
A requirement-aware security service platform based on virtual-physical integration
卢凯,于增明,黄兵
Research and practice of active defense technology in ICS cyber security
石永杰1,于慧超1,吕峰2,张畅3,吴亚萍3
A security situation awareness method for software defined network
郑忠斌1,黎聪2,王朝栋1
Design and application of computer database security detection tool based on attribute encryption
陈良英
2D mesh camera motion estimation algorithm with line preserving constraint
杨涛,罗健欣,金凤林
Design and implementation of underwater detector based on Arduino Mega 2560
汪淑贤,李明,王旬
77 GHz FMCW automotive radar system design
张科遥,林福江,白雪飞
Simulation and analysis of multicast routing protocol in Ad Hoc network based on link stability
周永塔
Implementation of Beidou-3 satellite B2a code generator based on FPGA
臧志斌,夏传福,吴小鸥,马军,傅宁
Trajectory planning and control for SCARA manipulator of tea picking robot
汪琳,关胜晓
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。