Survey on constructing eviction sets in conflictbased cache side channel attacks
李真真1,2,宋威1,2
Legal regulation and enhancement path for mitigating risks in training
邢露元1,沈心怡2,王嘉怡3
A DGA malicious domain detection method based on attention feature fusion network
郝旭光
The big data era: opportunities and challenges for numerical weather prediction
郭亚楠1,2,曹小群1,周梦鸽1,彭柯澄1
Research on object detection in remote sensing image based on YOLOv7-RS
梁琦1,2,杨晓文2,3,4
Exploration and achievements of ecological smart city construction in Deyang
刘泽球1,申谦2,代铃1
Construction of public data authorized operation grading standard
张效科
The legal logic and rule development of data property rights protection
杨孝康,方卓尔,李旺,卢旭阳,高政民
Theoretical logic and system construction of personal information protection compliance audit
王冲
Design and application of coal mine hydraulic support pressure sensor based on wireless Mesh Ad Hoc network
赵阳羲,姬胜凯,李斌,杨志明,陈俊凯
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。