Research on the protection of mobile office network security technology for important enterprises
张天维,南 静,张大松,陈雪飞
SimMal:heterogeneous graph learning-based malware association analysis system
章瑞康,周 娟,袁 军,李文瑾,顾杜娟
Industrial control security analysis of SCADA system for oil and gas pipeline
刘 锐1,薛金良2,包贤晨2,王永军1,郑承洧2
Research on intelligent recommendation algorithm integrating user interest modeling
洪志理,赖 俊,曹 雷,陈希亮
Euclidean distance disentanglement adaptive method for multi-view cross-database facial expression recognition
梁 广
Preliminary conception of application scenario construction of "commodity classification+blockchain"
张世豪1,练 兵2,穆雪梅1,华 桦1
Research on distributed data sharing mode and algorithm based on smart contract
姜庆臣1,莫路锋1,朱雪芬1,唐丽华2
Development of door engine controller based on drive and control integrated technology
向前进,王毅璇
Logistics sorting method and system based on digital image processing
王 敏,王 康,庄志豪,卢裕贵,孙 硕
Analysis of cloud macroscopic characteristics in northwestern Shanxi province based on CloudSat/CALIPSO data
郭俊杰1,王江涛1,蒯 亮2,舒 展1,葛耀明3
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。