Research status of smart contract security
赵 辉1,李 星1,谭嘉诚1,盖珂珂2
The development status of frontier technology of blockchain security and privacy protection
张慧茹,汪美荃,李光顺
Formal analysis of the DAO exploit
朱雪阳1,2
Infectious disease risk management scheme based on blockchain
范勋峰,杨文梯,关志涛
Design of intelligent decision-making system for cyber security
冯政鑫1,唐 寅1,韩 磊2,吴 锡1
The current situation and thinking of the development of cyberspace security technology
李 利1,韩伟红2,梅阳阳2,王 欢1
Multi-focus image fusion based on NSST and NLMF
吴 剑1,吴晓红1,何小海1,李林怡2,卿粼波1
Research on equipment energy consumption anomaly identification algorithm based on real-time data stream feature extraction
黄家续1,曾献辉1,2,施陈俊1
Classification of odor descriptors based on AE-SVM
朱红梅,骆德汉,莫卓峰
Single-view 3D reconstruction based on margin regularization
胡茂林,李金龙,胡 涛
Design of a high voltage handling SPST antenna tuning switch
夏小辉,林福江
A software load balancing strategy in resource-constrained environment
张思豪,田建宇,刘银良,刘卫新,刘经天
Research on invoice recognition and self correction system based on color segmentation
王 涛
Multistage evaluation for the health of DNS based on group analytic hierarchy process
姜 燕1,李 露1,胡 博2,许元斌3,杨 超4,董世丹傑3,杨泽坡1,李龙媚1
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。