Survey of the research on security standard and protection model for Internet of Things
肖益珊1,2,张 尼3,刘廉如1,2,张忠平1,2
Android malware detection based on feature generation method
冯 垚,王金双,张雪涛
Design and implementation of network anomaly detection system based on association rules
刘金龙1,刘 鹏1,裴 帅2,田 冲2
Research on identity authentication mechanism of IoT devices based on zero trust architecture
郭仲勇1,刘 扬2,张宏元1,刘帅洲1
Hive data provenance method based on DAG
杜 娟1,苏秋月2
Research progress and challenges of malware detection method based on machine learning
景鸿理1,黄 娜1,2,李建国1
Research on the standard system framework of intelligent weaponry
徐晨华1,2
GANs-based unsupervised regression for 3D morphable model
张星星1,李金龙2
Identification of cuttings particle based on improved P-Unet model
万 川1,王正勇1,何海波2,滕奇志1,何小海1
Research on fabric defect detection method based on convolutional neural network
刘艳锋1,2,郑云波3,黄惠玲2,张财贵4,刘文芳2,韩 军2
Research on target tracking using single station based on fine time measurement and channel state information
林 杰1,2,赵跃新1,刘 鹏1,唐 磊3
Design and implementation of Chinese yes-no question answering system based on Lucene
罗东霞,卿粼波,吴晓红
Threat intelligence website value assessment method based on AHP
张 雷,宋 栋,刘 红
Automatic envelope fitting method of perfusion areas based on non-convex hull
谢家靖1,滕奇志1,何小海1,龚 剑2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。