Design of a consensus network reorganization mechanism based on credibility score
郑儿1,陈麓竹1,赵静1,姚旺君1,文新2
An IoT abnormal traffic detection method based on communication pattern matching within a graph structure
靳文京1,周成胜1,刘美伶2
Fuzzy identification analysis of new energy industrial control protocol based on honeypot
田学成1,赵谦1,2,罗谢3,陈燕峰1
An authentication scheme for trusted network probing based on multiple mechanisms integrating
王斌,李琪,张宇,史建焘,朱国普
Traffic generation methods based on generative adversarial neural networks
康未,李维皓,刘桐菊
Design of Modbus-RTU master station gateway based on EtherCAT bus
王永峰,康晋菊,胡啸,张彪,封成玉
Research on automated paths for enterprise data classification and grading
卢启刚1,杨克松2,王建2,王思博2,吴映波1
Discussion and practice of data classification and grading strategy in colleges
张聪
From illegal to legal: evolving regulatory frameworks for generative artificial intelligence
刘学荣
The practical dilemma and improvement of cyber crime sampling and forensics
刘宇浩
Study on the object of data intellectual property rights registration
林沐政
Algorithmic discretion in the perspective of process theory:formation mechanisms, practical dilemmas and paths to the rule of law
雷刚,蒋安琪
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。