Research on the scheme and mode of data sovereign exchange platform
房殿军1,2,郑卓远1,洪 晟3,韩佳良1,向佳豪1,蒋红琰1,2,4
Intelligent clothing detection within a washing machine based on data sovereignty
谢海琴,杨 雯,肖 琳
Research on repair method in Industrial Internet of Things based on attack anomaly characteristics
赵剑明1,2,3,4,曾 鹏1,2,3,袁 辉5
Case study on data governance in digital transformation of optical fiber industry
汪 洋1,王 柯1,张桃宁1,韩 蕊1,彭艳兵1,2,汤国强1,2
Research on fuzzy test method of the detection ability of in-vehicle CAN bus intrusion detection algorithm
田韵嵩1,李中伟1,谭 凯1,洪 晟2,刘 勇1,金显吉1
Application research for remote monitoring and fault diagnosis of locomotive
谢 利1,洪 晟2,谢经广1,董先明1
Exploration of industrial data security governance
马跃强,陈怀源,李 晨
Research on the security application of encrypted multi-source collaborative for power big data
杨赟博1,2,胡雪晖1,洪 晟3
DNS covert channel detection method based on LSTM
陈解元
Research on security monitoring method of Docker container engine based on OpenStack cloud platform
崔 轲,燕 玮,刘子健,张慕榕,贾星威,许凤凯
Method for deleting duplicate domain name data based on Simhash algorithm
侯开茂,韩庆敏,吴云峰,黄 兵,张久发,柴处处
Research on network security problems and countermeasures under the background of wisdom campus
张 鸿,高晓艳
A deep RL-based algorithm for coordinated charging of electric vehicles
张子霖
Abnormal user behavior detection algorithm based on dynamic time span and cluster difference index
詹 麟1,曾献辉1,2,代凯旋1
Application of blockchain in drug traceability
李曼玉,于 瓅
Design and implementation of embedded software test platform
金成杰1,俎 涛2,张焕欣1
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。