Research on the construction of integrated cyber range based on virtualization
周云1,刘克斌2,苏辉1,林飞2,钟杰2
Design and implementation of SCADA system for urban gas pipeline network based on PKS
林浩,李慧敏,马达,齐涛
APT attack identification and tracing technology based on threat intelligence correlation
赵云龙,杨继,于运涛,王绍杰
Design of a deep learning-based ransomware defense architecture for smart campuses
朱朝阳1,朱晓2,朱磊3,许杏1
Energy-efficient scheme of elliptic curve cryptography scalar multiplication
吴昆1,胡现刚2,张学超3,汪晓睿1
Implementation of trustworthy storage system for sensitive data based on blockchain
何刚1,杨元瑾2
Elephant flow detection method based on data arrival interval
赵亮1,林栎2
Fine-grained identification method of home-work location based on travel characteristics of residents
黄兴如,李奕萱,刘中亮,冯瀚斌,王希昭,闫龙,胡博文,李炫孜,李大中
Research on nuclear power operation data service based on industrial Internet platform
程敏敏1,朱灿1,何栓1,费淏1,2,於泽辰1,2
Analysis on the marketization approach of data elements——To build a Chinese-style data trust as a starting point
李金峰
Analysis of data elements industrial policies of local governments and suggestions for the framework of policy tools
曾建,李哲行,路琨
Analysis of data cross-border flow rules from the perspective of Data Privacy Framework system and its implications for China
杨子硕
The form, reason and regulation of mandatory "user consent" of consumer Apps
文禹衡1,2,虞美婷1
County data security governance system construction and challenges
吕秋云1,2 ,娄肖琦1,任一支1,赵程遥3,张纪林4
Alleviation of the dilemma of determining the causality of personal information infringement——Taking the presumption of causality as the approach
游源
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。