A review on architecture of white box switches for future networks
张成林1,宋玲玲2
Research and implementation of face security technology detection based on video
曲本盛
Design and implementation of edge detection system based on improved Sobel operator
李 迪,吴 奇,杨浩森
Research on scene analysis and defense strategy about supply chain of the energy Internet
李鸿彬1,张赛楠1,魏恩浩1,杨雪华2
Research on vulnerability analysis of industrial control system
李 实1,万 睿1,周 帅2
Application of AES cache collision attack in American space security challenge
雷思磊,仇 婕,马婷婷
A point cloud plane fitting method using LMedS algorithm and eigenvalue method
苏毅辉,陈志聪,吴丽君
An energy saving algorithm of base station air conditioning based on clustering for dual temperature optimization control
代凯旋1,曾献辉1,2,詹 麟1
Research on human posture estimation in earthquake rescue based on ResNet50
邬春学,贺欣欣
A car-following model based on bidirectional GRU and residual fitting
王嘉伟
Secure communication scheme between industrial computer and controller in PLC-system
张 菡1,2,林 浩2,张兴波2,加舒娟1
Patterns recognition of unsafe behavior in chemical laboratory based on C3D
刘凯源
Research on household load identification method based on difference features and AdaBoost
王岩俊1,蔡高琰2,骆德汉1,梁炳基2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。