Overview of text classification for emergency related information on social platforms
姜钰棋, 强子珊,卜凡亮
Research on the cyber security protection mechanism of digital factories abroad——taking Lockheed Martin as an example
杜洪涛,李云志
Application of visual malware analysis technology of data science in archive digital security management system
高伟波1,徐炳雪2,李仲琴1,赫明春3
Research on the construction method of data security capability system for financial domain
赵晓令,白惠文,李安伦
Design of a small PLC controller based on domestic MCU and FPGA chips
王永峰,康晋菊,霍书侠,郭佳,南扬,张彪
6D pose estimation based on point cloud instance segmentation
周剑
The application of virtual human in the smart ideological and political system of universities
蒋莉薇1,李佩洁2
Design of a distributed resource authorization system based on blockchain
张义,李桐,王钺
Research hotspots and trends analysis of government open data risk in China
申笑宇1,罗书怡1,胡文袁2,贾新露3
Research on the Internet rumor governance model based on group participation
宋彪1,闫俊2
The conflict of extraterritorial jurisdiction of the GDPR in the context of comity and China′s response
程千帆
Research on the key considerations and architecture framework for implementing public data authorization operation
卢启刚1,陈晨2,师旭颖2,王思博2,吴映波1
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。