Promote registration of industrial data property rights and accelerate capitalization of data elements
田野
Risk assessment of oil and gas production IoT system based on Bayesian attack graph
刘子龙1,周纯杰1,胡晓娅1,2,曹德舜3,李娜3
Research on network security protection system of power system under distributed new energy storage
王蕊1,2,王尊1,2,董良遇1,2,李杨1,2,赵佳宁1,2,张进杰3
Analysis of attack path in HAS4 finals based on SPARTA framework
雷思磊,荆美倩,龙森
Research on WebShell file detection based on BERT-LSTM model
邓全才,徐怀彬
Research on the integration of Data/Cyber/Application mixed security in digital ecological construction
马开萍,许国栋,顾亮,陈婷婷
Research on hierarchical management for distributed data based on edge-terminal collaboration
任德旺1,2,周俊鹏1,2,倪鑫1,2,李丽娜1,2,李亚晖1,2,李运喜1,2
Application of deep learning model combined with batch normalization layer in underwater target recognition
孙悦,彭圆,贾连徽,曹琳,郭欣雨,徐剑秋
Research on small.scale, multi.angle face detection methods in complex backgrounds
黄杰,刘芬
The challenge and governance path of generative artificial intelligence to personal information protection
万美秀
Data protection and circulation under EU delicate data legislation
何润韬
Research on data classification and grading methods for intelligent connected vehicles based on feature analysis
冀智华,王瑞,张巧
The enlightenment of EU data governance model on the development and utilization of data elements in China
宋姝媛,王岩,路琨,李聪聪,谭天怡
The legitimacy of reverting digital "intellectual achievements" protection to copyright law——Background on the path selection for protecting AI-generated content
徐榕岭
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。