Malicious URL detection based on double attention mechanism
赵云泽,蒋牧秋,董 伟,冯 志
Virtual network and cloud native network application based on eBPF
施苏峰
Research on the network security access management system of nuclear power plants
李 实,王绍杰,万佳蓉,衣 然
Medical insurance fraud governance scheme based on message characteristics in the view of firewall
徐雅卿,张靖琦
Analysis on the crime of infringing on citizens′ personal information from the perspective of economics of crime
蚁继靖
Analysis and suggestions on key issues of government cloud engineering
陶 路,张文星,李 繁
The value and characteristics of university data governance
董晓辉,马 威
The conception of algorithm audit in big data era
付冉冉
Regulation and response to identity theft in the digital age
赵赫栋
Prediction model of SO2 concentration at outlet of IPSO-GRU desulfurization system based on feature selection
杨兆祥,金秀章
Densely connected video super-resolution based on three-dimensional spatial-sequential attention
何啸林,吴丽君
Action recognition based on spatial-temporal attention pyramid convolution
冯雨威,吴丽君
Magnetic azimuth correction based on DBSCAN multi-station analysis algorithm
许泽凡,宋红伟,张明菊,胡少兵,陈雪菲,程为彬
Experimental analysis of the characteristics of U.S. and Western media′s tweets on the China-related epidemic
王丽娜,耿雪芹
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。