Enlightenments and reflections of the American review TikTok data security
许皖秀,左晓栋
The data governance logic and path optimization of short video content anomie
刘俊亭
Intrusion detection system of Web application based on SVM and Word2Vec
凌仕勇1,龚锦红2
A model training service system for data sharing
魏宏原1,2,华 蓓1,2,林 飞1,2
Analysis of Chinese industrial data security protection laws and regulations
刘 曼1,洪 晟2
Research on American zero trust and its enlightenment
姚相振,李彦峰,孙 彦,羡喻杰
Research progress of edge computing security and privacy-preserving
沈传年
Research on cyberspace map technology in the electric power industry
许勇刚,王利斌,杨 阳,胡宇宣,尹 琴
Analysis on the construction of network security protection system of industrial control system in petrochemical industry
霍朝宾,武 蕊
Research on communication boundary security of new energy wind power network based on Modbus protocol
田学成1,2,张五一1,2,江 楠1,2,陈燕峰1,2
Traffic flow prediction based on PSO optimized Bi-LSTM
樊 冲
Improved sparrow search algorithm based on t-distribution variation
吴超略,韦文山,郭 羿,邬贵昌
An online estimation algorithm for freely evolving quantum states
黄 吉,丛 爽,张 坤
Differentiable front-end of SincNet with orthogonal constrains and its application in audio classification
刘 伟,孙 蒙,张 玥,张雄伟
Research on visualization application topology modeling method for space mission
刘贵聪1,周 淦1,杜 超1,蒯 亮1,赵 爽2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。